ASUSTOR Data Master < 3.1.3 Multiple Vulnerabilities

2018-07-24T00:00:00
ID ASUSTOR_DATA_MASTER_3_1_3.NASL
Type nessus
Reporter Tenable
Modified 2018-07-24T00:00:00

Description

According to its self-reported version number, the ASUSTOR Data Master (ADM) web interface running on the remote web server is prior to 3.1.3. It is, therefore, affected by multiple vulnerabilities, including unauthenticated remote code execution.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(111232);
  script_version("1.1");
  script_cvs_date("Date: 2018/07/24 17:53:03");

  script_cve_id("CVE-2018-12313");

  script_name(english:"ASUSTOR Data Master < 3.1.3 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of ASUSTOR Data Master.");

  script_set_attribute(attribute:"synopsis", value:
"A web interface for ASUSTOR NAS devices running on the remote web
server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the ASUSTOR Data
Master (ADM) web interface running on the remote web server is prior
to 3.1.3. It is, therefore, affected by multiple vulnerabilities,
including unauthenticated remote code execution.");
  # http://download.asustor.com/download/docs/releasenotes/RN_ADM_3.1.3.RHU2.pdf
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?22368ff7");
  # https://blog.securityevaluators.com/unauthenticated-remote-code-execution-in-asustor-as-602t-2d806c30dcea
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?60b3f734");
  script_set_attribute(attribute:"solution", value:
"Upgrade to ASUSTOR Data Master (ADM) version 3.1.3 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-12313");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/05/31");
  script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/24");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:asustor:data_master");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("asustor_data_master_detect.nbin");
  script_require_keys("installed_sw/ASUSTOR Data Master");
  script_require_ports("Services/www", 8000, 8001);

  exit(0);
}

include("vcf.inc");
include("http.inc");

app = "ASUSTOR Data Master";
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:8000, embedded:TRUE);

app_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);

constraints = [{ "fixed_version" : "3.1.3" }];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_HOLE
);