Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.ALA_ALAS-2020-1347.NASL
HistoryFeb 28, 2020 - 12:00 a.m.

Amazon Linux AMI : php73 (ALAS-2020-1347)

2020-02-2800:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7.8

Confidence

High

EPSS

0.004

Percentile

74.0%

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2020-7059)

When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash. (CVE-2020-7060)

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2020-1347.
#

include('compat.inc');

if (description)
{
  script_id(134120);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/25");

  script_cve_id("CVE-2020-7059", "CVE-2020-7060");
  script_xref(name:"ALAS", value:"2020-1347");

  script_name(english:"Amazon Linux AMI : php73 (ALAS-2020-1347)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Amazon Linux AMI host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"When using fgetss() function to read data with stripping tags, in PHP
versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2
it is possible to supply data that will cause this function to read
past the allocated buffer. This may lead to information disclosure or
crash. (CVE-2020-7059)

When using certain mbstring functions to convert multibyte encodings,
in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below
7.4.2 it is possible to supply data that will cause function
mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may
lead to information disclosure or crash. (CVE-2020-7060)");
  script_set_attribute(attribute:"see_also", value:"https://alas.aws.amazon.com/ALAS-2020-1347.html");
  script_set_attribute(attribute:"solution", value:
"Run 'yum update php73' to update your system.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-7060");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/02/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/02/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/28");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-bcmath");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-cli");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-dba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-embedded");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-enchant");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-fpm");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-gd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-gmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-imap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-intl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-json");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-ldap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-mbstring");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-mysqlnd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-odbc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-opcache");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-pdo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-pdo-dblib");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-pgsql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-process");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-pspell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-recode");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-snmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-soap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-tidy");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-xml");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php73-xmlrpc");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Amazon Linux Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
  if (os_ver == 'A') os_ver = 'AMI';
  audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}

if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (rpm_check(release:"ALA", reference:"php73-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-bcmath-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-cli-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-common-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-dba-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-dbg-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-debuginfo-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-devel-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-embedded-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-enchant-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-fpm-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-gd-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-gmp-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-imap-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-intl-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-json-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-ldap-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-mbstring-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-mysqlnd-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-odbc-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-opcache-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-pdo-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-pdo-dblib-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-pgsql-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-process-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-pspell-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-recode-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-snmp-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-soap-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-tidy-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-xml-7.3.14-1.23.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php73-xmlrpc-7.3.14-1.23.amzn1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php73 / php73-bcmath / php73-cli / php73-common / php73-dba / etc");
}
VendorProductVersionCPE
amazonlinuxphp73p-cpe:/a:amazon:linux:php73
amazonlinuxphp73-bcmathp-cpe:/a:amazon:linux:php73-bcmath
amazonlinuxphp73-clip-cpe:/a:amazon:linux:php73-cli
amazonlinuxphp73-commonp-cpe:/a:amazon:linux:php73-common
amazonlinuxphp73-dbap-cpe:/a:amazon:linux:php73-dba
amazonlinuxphp73-dbgp-cpe:/a:amazon:linux:php73-dbg
amazonlinuxphp73-debuginfop-cpe:/a:amazon:linux:php73-debuginfo
amazonlinuxphp73-develp-cpe:/a:amazon:linux:php73-devel
amazonlinuxphp73-embeddedp-cpe:/a:amazon:linux:php73-embedded
amazonlinuxphp73-enchantp-cpe:/a:amazon:linux:php73-enchant
Rows per page:
1-10 of 331

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7.8

Confidence

High

EPSS

0.004

Percentile

74.0%