On Fri, 5 Mar 2004 someone wrote:

> When scanning Blackboard servers, we get a ALOT (just about all I
> expect) of cgi related exploits. We have found out, that it's
> because the Blackboard servers respond with a "HTTP errocode 200"
> when Nessus probes them, and then Nessus assumes the exploit is
> there.
>
> It would be very nice, if that could be fixed somehow? If the
> scan-report is neede, then let me know and I'll make it available.

no404.nasl tries its best to deal with such web servers, however it will
never be perfect.  The last I remember hearing about this issue was that
the CGI Abuse plugins that suffer from these false positives are the ones
that merely see if the server responded at all to a specific request.  I
think the plugins that solely rely on is_cgi_installed (or code similar to
it) are the main culprits.  I'm guessing all new CGI Abuse plugins do some
extra checks to make sure it is not reporting a false positive.

is_cgi_installed will honor what no404.nasl says, so maybe patching
no404.nasl to your liking will help.  I've seen messages about this dating
back to a couple of years ago, so I don't think this will be tackled any
time soon, especially since such web servers are considered "broken".
Don't quote me on that, though :)


Best regards,
Erik Stephens                                           www.edgeos.com
                             Managed Vulnerability Assessment Services
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to