TrustKeeper Scan Engine is the scanner that powers Trustwave's Vulnerability Scanning Services, which help organizations around the world find vulnerabilities in their network environments. It also happens to be a key component of the TrustKeeper service that is used by thousands of merchants, financial institutions and credit card processors to achieve PCI compliance as an ASV (Approved Scanning Vendor) certified solution.
The SpiderLabs Research Team provides constant updates to the TrustKeeper Scan Engine, which are immediately available to customers so they can detect the latest vulnerabilities. Up until this point, these details have only been shared with internal Trustwave employees on a “need to know” basis. However, requests have recently come in to get more information about the new magical developments as they are added to the scan engine.
Starting this week, we will begin to provide updates on the highlights going into the scanner which will be published here on the SpiderLabs Blog for your viewing pleasure.
This update includes tests for vulnerabilities in products made by Plixer International, Apache, Microsoft, Cisco, IBM, Oracle and many more. We have also made a number additions to our web application fingerprints, some which are described in the general improvements section below.
Tanya Secker of SpiderLabs discovered the Plixer International Scrutinizer vulnerabilities included in this update. For more details on the Scrutinizer vulnerabilities, visit the Trustwave Security Advisories Page and our recent blog post.
New Vulnerability Test Highlights
Some of the more interesting vulnerability tests added recently are as follows:
- Plixer International
- Scrutinizer HTTP Auth Bypass Vulnerabilities (CVE-2012-1258)
- Scrutinizer SQL Injection Vulnerabilities (CVE-2012-1259)
- Scrutinizer Persistent Cross-Site Scripting Vulnerabilities (CVE-2012-1260)
- Scrutinizer Reflected Cross-Site Scripting Vulnerabilities (CVE-2012-1261)
- Subversion SVNPathAuthz Denial of Service Vulnerability (CVE-2011-1783)
- Subversion NULL-Pointer Dereference Vulnerability (CVE-2011-1752)
- HTTP Server on Windows Shell Command Pass-Through Vulnerability (CVE-2002-0061)
- HTTP Server mod_proxy_ajp with mod_proxy_balancer Denial of Service Vulnerability (CVE-2011-3348)
- Windows Kernel-Mode Drivers RCE Vulnerability (CVE-2011-5046)
- Unified Communications Manager Multiple SQL Injection Vulnerabilities (CVE-2011-1610)
- WebSphere Application Server Vulnerability in XML Digital Signature Processing (CVE-2009-0217)
- Security Update Multiple Vulnerabilities (CVE-2009-0217, CVE-2009-1974, CVE-2009-1975)
The TrustKeeper Scan Engine is one of few vulnerability scanners that attempt to better understand the web application that is installed using a technique called “Web Application Fingerprinting”. This allows for more precise attacks to hinge on this context resulting in a more accurate understanding of the application and higher vulnerability detection rates.
Some of the Web Application Fingerprint improvements we've made recently are as follows:
- Plixer International Scrutinizer
- Apache Subversion
- Apache Tomcat Host Manager
- Cisco Unified Communications Manager
- BitWeaver CMS
How to Update?
All Trustwave customers using the TrustKeeper Scan Engine receive the updates “auto-magically” as soon as an update is available. No action is required.