On Wed, Oct 26, 2016 at 03:10:04PM +0200, Christian Fischer wrote:
> Not directly. As long as one of the following binaries are found in the
> PATH of the user for authenticated scans:
> 
> php
> php-cli
> php5
> php7.0
> 
> the detection of PHP should work and you should get a "Linux PHP
> Detection" (OID: 1.3.6.1.4.1.25623.1.0.103592) Log entry with the
> detected PHP version. Based on this Vulnerabilities are reported for the
> detected PHP independently from the distro package names.

How can I debug this detection? I've checked login into with ssh credentials
manually and scan user has:

$ whereis php
php: /usr/bin/php /etc/php.ini /etc/php.d /usr/lib64/php
/usr/include/php /usr/share/php /usr/share/man/man1/php.1.gz

But I don't have any issue with PHP in my report :(
_______________________________________________
Openvas-plugins mailing list
Openvas-plugins@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to