
Resolve 2 issues for PCI Compliance failure
- or -
Post a project like this2320
$30
- Posted:
- Proposals: 6
- Remote
- #2169315
- Awarded
Top rated PHP Web Development | WordPress | Magento | Drupal | OpenCart | PrestaShop | Joomla

♛ PPH No. #1 ♛ 21Years of Experience in Web Development , Web Designing, Magento , Shopify, WordPress , API Integration, Full-Stack Ruby on Rails Developer,AngularJS / Node.js


Full Stack Developer, Next.js, Node.js, Laravel, PHP, WordPress, Shopify, Wix, Squarespace, OpenCart, AI ChatBot, Web3.js, Cryptocurrency API, SEO, & Digital Marketing


44928323902131050754117000576832082692




Description
Experience Level: Entry
Need to resolve 2 issues that resulted in a PCI compliance failure. Issues are below. My website is running on Ubuntu, Apache2, PHP, Magento
Title
CGI Generic Command Execution (time-based)
Synopsis
It may be possible to run arbitrary code on the remote web server.
Impact
The remote web server hosts CGI scripts that fail to adequately sanitize request strings. By leveraging this issue, an attacker may be able to execute arbitrary commands on the remote host. See also : https://en.wikipedia.org/wiki/Code_injection http://projects.webappsec.org/OS-Commanding
Resolution
Restrict access to the vulnerable application. Contact the vendor for a patch or upgrade.
Data Received
Using the GET HTTP method, SecurityMetrics found that : + The following resources may be vulnerable to arbitrary command execution (time based) : + The 'p' parameter of the /tag/product/list/tagId/116/ CGI : /tag/product/list/tagId/116/?order=name&dir=desc&infParam=1&limit=12&mod e=list&p=2%7C%7C%20sleep%203%20%26 -------- output -------- ------------------------
Title
Weak DH Key Exchange Supported (PCI DSS)
Synopsis
A service on the remote host supports a weak key exchange mechanism
Impact
At least one of the services on the remote host supports a Diffie-Hellman key exchange using a public modulus smaller than 2048 bits. Diffie-Hellman key exchanges with keys smaller than 2048 bits do not meet the PCI definition of strong cryptography as specified by NIST Special Publication 800-57 Part 1. Diffie-Hellman moduli of up to 1024 bits are considered practically breakable by an attacker with very significant resources. See also : https://weakdh.org/
Resolution
Consult the software's manual and reconfigure the service to use at least 2048-bit DH parameters. Alternatively, disable DH and use only Elliptic-curve Diffie-Hellman (ECDH) instead.
Data Received
The SSH service on port 22 supports a weak DH modulus : - The very common 1024-bit Oakley Group 2 DH modulus - DH group exchange is enabled and 1024-bit parameters are allowed
CVEs
CVE
Score
Vector
CVE-2015-4000
4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Title
CGI Generic Command Execution (time-based)
Synopsis
It may be possible to run arbitrary code on the remote web server.
Impact
The remote web server hosts CGI scripts that fail to adequately sanitize request strings. By leveraging this issue, an attacker may be able to execute arbitrary commands on the remote host. See also : https://en.wikipedia.org/wiki/Code_injection http://projects.webappsec.org/OS-Commanding
Resolution
Restrict access to the vulnerable application. Contact the vendor for a patch or upgrade.
Data Received
Using the GET HTTP method, SecurityMetrics found that : + The following resources may be vulnerable to arbitrary command execution (time based) : + The 'p' parameter of the /tag/product/list/tagId/116/ CGI : /tag/product/list/tagId/116/?order=name&dir=desc&infParam=1&limit=12&mod e=list&p=2%7C%7C%20sleep%203%20%26 -------- output -------- ------------------------
Title
Weak DH Key Exchange Supported (PCI DSS)
Synopsis
A service on the remote host supports a weak key exchange mechanism
Impact
At least one of the services on the remote host supports a Diffie-Hellman key exchange using a public modulus smaller than 2048 bits. Diffie-Hellman key exchanges with keys smaller than 2048 bits do not meet the PCI definition of strong cryptography as specified by NIST Special Publication 800-57 Part 1. Diffie-Hellman moduli of up to 1024 bits are considered practically breakable by an attacker with very significant resources. See also : https://weakdh.org/
Resolution
Consult the software's manual and reconfigure the service to use at least 2048-bit DH parameters. Alternatively, disable DH and use only Elliptic-curve Diffie-Hellman (ECDH) instead.
Data Received
The SSH service on port 22 supports a weak DH modulus : - The very common 1024-bit Oakley Group 2 DH modulus - DH group exchange is enabled and 1024-bit parameters are allowed
CVEs
CVE
Score
Vector
CVE-2015-4000
4.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N)

Judy L.
100% (11)Projects Completed
11
Freelancers worked with
10
Projects awarded
45%
Last project
26 Sep 2023
United States
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
Judy , please share your website link.
721406
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies