Lucene search

K
nessusThis script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-CUCM-RCE-PQVYWYB_UC.NASL
HistoryApr 23, 2021 - 12:00 a.m.

Cisco Unity Connection RCE (cisco-sa-cucm-rce-pqVYwyb)

2021-04-2300:00:00
This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
187

The version of Cisco Unity Connection installed on the remote host is affected by a remote code execution vulnerability due to improper sanitization of user-supplied input. An authenticated, remote attacker can exploit this, by sending a SOAP API request with crafted parameters, in order to execute arbitrary code with root privileges on the underlying operating system.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

##
# (C) Tenable Network Security, Inc.
##

include('compat.inc');

if (description)
{
  script_id(148969);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/04/23");

  script_cve_id("CVE-2021-1362");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvv35203");
  script_xref(name:"CISCO-SA", value:"cisco-sa-cucm-rce-pqVYwyb");
  script_xref(name:"IAVA", value:"2021-A-0162");

  script_name(english:"Cisco Unity Connection RCE (cisco-sa-cucm-rce-pqVYwyb)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Cisco Unity Connection installed on the remote host is affected by a remote code execution vulnerability
due to improper sanitization of user-supplied input. An authenticated, remote attacker can exploit this, by sending a
SOAP API request with crafted parameters, in order to execute arbitrary code with root privileges on the underlying
operating system.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-pqVYwyb
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c59ecd3a");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv35203");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvv35203.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-1362");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(94);

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/04/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/04/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/04/23");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:unity_connection");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_uc_version.nasl");
  script_require_keys("installed_sw/Cisco VOSS Unity");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::get_app_info(app:'Cisco VOSS Unity');

# 11.5(1)SU9: https://software.cisco.com/download/home/286286362/type/282074295/release/11.5(1)SU9
# 12.5(1)SU4: https://software.cisco.com/download/home/286313379/type/286319533/release/12.5(1)SU4
var constraints = [
  { 'min_version' : '10.5.2', 'fixed_version' : '10.5.2.999999', 'fixed_display' : 'See vendor advisory' },
  { 'min_version' : '11.0.1', 'fixed_version' : '11.0.1.999999', 'fixed_display' : '11.5(1)SU9' },
  { 'min_version' : '11.5.1', 'fixed_version' : '11.5.1.21900.40', 'fixed_display' : '11.5(1)SU9' },
  { 'min_version' : '12.0.1', 'fixed_version' : '12.0.1.999999', 'fixed_display' : '12.5(1)SU4' },
  { 'min_version' : '12.5.1', 'fixed_version' : '12.5.1.14900.45', 'fixed_display' : '12.5(1)SU4' }
];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_HOLE
);

VendorProductVersionCPE
ciscounity_connectioncpe:/a:cisco:unity_connection
Related for CISCO-SA-CUCM-RCE-PQVYWYB_UC.NASL