Cisco Identity Services Engine Cross-Site Scripting Vulnerability (cisco-sa-20190206-ise-xss)

2019-06-21T00:00:00
ID CISCO-SA-20190206-ISE-XSS.NASL
Type nessus
Reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2020-09-02T00:00:00

Description

According to its self-reported version, Cisco Identity Services Engine Software is affected by a cross-site scripting vulnerability. This could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface.The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

                                        
                                            #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(126102);
  script_version("1.6");
  script_cvs_date("Date: 2020/02/14");

  script_cve_id("CVE-2019-1673");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvn64652");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20190206-ise-xss");

  script_name(english:"Cisco Identity Services Engine Cross-Site Scripting Vulnerability (cisco-sa-20190206-ise-xss)");
  script_summary(english:"Checks the Cisco Identity Services Engine Software version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Identity Services Engine
Software is affected by a cross-site scripting vulnerability.
This could allow an authenticated, remote attacker to conduct a
cross-site scripting (XSS) attack against a user of the web-based
management interface.The vulnerability is due to insufficient
validation of user-supplied input that is processed by the web-based
interface. An attacker could exploit this vulnerability by persuading
a user of the interface to click a crafted link. A successful exploit
could allow the attacker to execute arbitrary script code in the
context of the interface or access sensitive browser-based
information.

Please see the included Cisco BIDs and Cisco Security Advisory for
more information");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-ise-xss
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9e3cd932");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn64652");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug IDs
CSCvn64652.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1673");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/02/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/06/21");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/h:cisco:identity_services_engine");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ise_detect.nbin");
  script_require_keys("Host/Cisco/ISE/version", "Settings/ParanoidReport");

  exit(0);
}

include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");

product_info = cisco::get_product_info(name:"Cisco Identity Services Engine Software");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

vuln_ranges = [
  { 'min_ver' : '2.1.0', 'fix_ver' : '2.2.0.470' },
  { 'min_ver' : '2.4.0', 'fix_ver' : '2.4.0.357' },
  { 'min_ver' : '2.5.0', 'fix_ver' : '2.6.0.156' }
];

workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();

# ISE version doesn't change when patches are installed, so even if
# they are on the proper version we have to double check patch level
required_patch = '';
if      (product_info['version'] =~ "^2\.2\.0($|[^0-9])") required_patch = '14';
else if (product_info['version'] =~ "^2\.4\.0($|[^0-9])") required_patch = '8';

reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_NOTE,
  'version'  , product_info['version'],
  'bug_id'   , 'CSCvn64652',
  'fix'      , 'See advisory',
  'xss'      , TRUE
);

# uses required_patch parameters set by above version ranges
cisco::check_and_report(product_info:product_info, reporting:reporting, workarounds:workarounds, workaround_params:workaround_params, vuln_ranges:vuln_ranges, required_patch:required_patch);