This post is more than 5 years old
2 Posts
0
18207
August 6th, 2015 10:00
Options to lock down PowerConnect 5524 after vulnerability scan
Hello,
After a recent vulnerability scan with BeyondTrust Retina, our PC 5524 showed hits such as:
| Medium | 10890 | Web Resource /cgi-bin/ Detected |
| Medium | 10898 | Web Resource /cgi-bin/index.jsp::$DATA Detected |
| Medium | 10907 | Web Resource /cgi-bin/jsp/index.jsp::$DATA Detected |
| Medium | 10930 | Web Resource /demo/../%3f.jsp Detected |
| Medium | 10942 | Web Resource /demo/../index.jsp::$DATA Detected |
| Medium | 10953 | Web Resource /demo/../jsp/index.jsp::$DATA Detected |
| Medium | 10871 | Web Resource /index.jsp::$DATA Detected |
| Medium | 10885 | Web Resource /jsp/index.jsp::$DATA Detected |
| Medium | 10910 | Web Resource /scripts/%3f.jsp Detected |
| Medium | 10919 | Web Resource /scripts/index.jsp::$DATA Detected |
| Medium | 10926 | Web Resource /scripts/jsp/index.jsp::$DATA Detected |
Besides disabling the web interface, is there any way to lock down access to those directories?
Thank you.
0 events found
No Events found!


srbank
2 Posts
0
August 6th, 2015 14:00
I suspected as much, but I apprecite your quick answer. Thank you.