Synopsis
The remote web server contains a PHP application that is prone to an information disclosure vulnerability.
Description
The remote host is running OraMon, an Oracle database monitoring tool written in PHP.
The OraMon installation on the remote host stores its configuration file in the web document directory and fails to restrict access to it. An unauthenticated attacker can retrieve it and discover sensitive information, such as credentials used for connecting to an Oracle database.
Solution
Use a .htaccess file or an equivalent to control access to files in the application's 'config' directory.
Plugin Details
File Name: oramon_ini_info_disclosure.nasl
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true