(EDIT: Added installed software versions)
I did not find an existing article in the forums about this recent enough to be relevant.
I created two Debian 12 (Bookworm) virtual machines, and installed Nethserver 8 to each using the same methods. The only differences between the two are hostnames. Both are only running ldap, mail, and roundcube. Both are working great!
I install updates weekly through the Nethserver WebGUI. One month ago, I did security scans on both from Nessus. One registered a PHP vulnerability, and the other did not even detect PHP installed. I confirmed this with an nmap scan - server one showed vulnerable PHP, the other server did not show PHP installed at all.
Three weeks ago I checked for (and installed if available) updates from Nethserver’s WebGUI. Then logged in to each and did apt update & apt upgrade -y on both just in case there were additional updates that Nethserver was missing. Rebooted the servers and re-did the scan, and the same vulnerability came up on one, but not the other.
Then two weeks ago I thought maybe an additional server management solution would help, so I did the Nethserver updates, the command line updates, and then installed Webmin and checked that for updates (there were no additional updates). Rebooted the servers and re-did the scan, and still one server has the vuln and on does not.
Last week I was busy.
Today I’m reading my weekly vulnerability report and am at a loss as to how to fix this.
I really love Nethserver and have been using it for what feels like a decade (idk how long but the first version I used was a CentOS VM image downloaded from the nethserver website) and am hoping that I can fix this so I don’t have to use something else because honestly who would want to use something else when Nethserver exists? Once I get this squared away, I hope to add some additional features like jabber and groupware and maybe a pbx, and I don’t know of any other turnkey solutions that support all of that anyway.
Any help is greatly appreciated!
Vuln info:
Critical PHP 8.1.x < 8.1.31 Multiple Vulnerabilities
URL : [REDACTED]:80/ (8.1.30 under X-Powered-By: PHP/8.1.30)
Installed version : 8.1.30
Fixed version : 8.1.31
nmap scan output:
Starting Nmap 7.80 ( https://nmap.org ) at 2024-12-17 10:44 EST
Nmap scan report for [REDACTED] (First server)
Host is up (0.0049s latency).PORT STATE SERVICE VERSION
80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-php-version: Version from header x-powered-by: PHP/8.1.30
|_http-server-header: Apache/2.4.62 (Debian)
MAC Address: [REDACTED] (Unknown)Nmap scan report for [REDACTED] (Second server)
Host is up (0.0055s latency).PORT STATE SERVICE VERSION
80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
MAC Address: [REDACTED] (Unknown)Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page .
Nmap done: 2 IP addresses (2 hosts up) scanned in 13.22 seconds
Server info:
First Server
OS: Debian GNU/Linux 12 (bookworm) x86_64
Host: KVM/QEMU (Standard PC (i440FX + PIIX, 1996) pc-i440fx-8.1)
Kernel: 6.1.0-28-amd64
Uptime: 8 mins
Packages: 591 (dpkg)
Shell: bash 5.2.15
Resolution: 1280x800
Terminal: /dev/pts/0
CPU: QEMU Virtual version 2.5+ (4) @ 2.999GHz
GPU: 00:02.0 Vendor 1234 Device 1111
Memory: 1494MiB / 3914MiB
Second Server:
OS: Debian GNU/Linux 12 (bookworm) x86_64
Host: KVM/QEMU (Standard PC (i440FX + PIIX, 1996) pc-i440fx-8.1)
Kernel: 6.1.0-28-amd64
Uptime: 10 mins
Packages: 610 (dpkg)
Shell: bash 5.2.15
Resolution: 1280x800
Terminal: /dev/pts/0
CPU: QEMU Virtual version 2.5+ (4) @ 2.999GHz
GPU: 00:02.0 Vendor 1234 Device 1111
Memory: 1528MiB / 3914MiB
Software versions for each:
core1 Node 1 3.3.1 ldapproxy1 Node 1 1.1.0 loki1 Node 1 1.2.2 openldap1 Node 1 2.2.6 traefik1 Node 1 2.2.5
_