Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities (cisco-sa-20190109-ise-multi-xss)

2019-06-21T00:00:00
ID CISCO-SA-20190109-ISE-MULTI-XSS.NASL
Type nessus
Reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2020-08-02T00:00:00

Description

According to its self-reported version, Cisco Identity Services Engine Software is affected by multiple cross-site scripting vulnerabilities. This could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

                                        
                                            #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(126103);
  script_version("1.6");
  script_cvs_date("Date: 2020/02/14");

  script_cve_id("CVE-2018-15440", "CVE-2018-15463");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvm71860");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvm79609");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20190109-ise-multi-xss");

  script_name(english:"Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities (cisco-sa-20190109-ise-multi-xss)");
  script_summary(english:"Checks the Cisco Identity Services Engine Software version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Identity Services Engine
Software is affected by multiple cross-site scripting vulnerabilities.
This could  allow an unauthenticated, remote attacker to conduct a 
stored cross-site scripting (XSS) attack or a reflected  cross-site
scripting (XSS) attack against a user of the  web-based management
interface of an affected device. 

Please see the included Cisco BIDs and Cisco Security Advisory for
more information");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3a6a291e");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm71860");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm79609");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug IDs
CSCvm71860 and CSCvm79609.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-15440");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/01/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/01/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/06/21");
  script_set_attribute(attribute:"potential_vulnerability", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/h:cisco:identity_services_engine");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ise_detect.nbin");
  script_require_keys("Host/Cisco/ISE/version", "Settings/ParanoidReport");
  exit(0);
}

include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");

product_info = cisco::get_product_info(name:"Cisco Identity Services Engine Software");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

vuln_ranges = [
  { 'min_ver' : '2.2.0', 'fix_ver' : '2.2.0.470' },
  { 'min_ver' : '2.3.0', 'fix_ver' : '2.3.0.298' },
  { 'min_ver' : '2.4.0', 'fix_ver' : '2.4.0.357' }
];

workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();

# ISE version doesn't change when patches are installed, so even if
# they are on the proper version we have to double check patch level
required_patch = '';
if      (product_info['version'] =~ "^2\.2\.0($|[^0-9])") required_patch = '13';
else if (product_info['version'] =~ "^2\.3\.0($|[^0-9])") required_patch = '6';
else if (product_info['version'] =~ "^2\.4\.0($|[^0-9])") required_patch = '6';

reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_WARNING,
  'version'  , product_info['version'],
  'bug_id'   , 'CSCvm71860, CSCvm79609',
  'fix'      , 'See advisory',
  'xss'      , TRUE
);

# uses required_patch parameters set by above version ranges
cisco::check_and_report(product_info:product_info, reporting:reporting, workarounds:workarounds, workaround_params:workaround_params, vuln_ranges:vuln_ranges, required_patch:required_patch);