Hi,

On 26.10.2016 15:20, Tomasz Jadowski wrote:
> On Wed, Oct 26, 2016 at 03:10:04PM +0200, Christian Fischer wrote:
>> Not directly. As long as one of the following binaries are found in the
>> PATH of the user for authenticated scans:
>>
>> php
>> php-cli
>> php5
>> php7.0
>>
>> the detection of PHP should work and you should get a "Linux PHP
>> Detection" (OID: 1.3.6.1.4.1.25623.1.0.103592) Log entry with the
>> detected PHP version. Based on this Vulnerabilities are reported for the
>> detected PHP independently from the distro package names.
> 
> How can I debug this detection? I've checked login into with ssh credentials
> manually and scan user has:

the debugging of this detection depends if you're getting the above log
entry or not. Also make sure that your Authenticated Scans are actually
working correctly.

Regarding,

-- 

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | http://greenbone.net
Neuer Graben 17, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to