According to its self-reported version number, the version of Cisco TelePresence Video Communication Server is affected by a command injection vulnerability known as Shellshock in its included GNU Bash shell. The vulnerability is due to the processing of trailing strings after function definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code via environment variable manipulation depending on the configuration of the system. The API over HTTP(S) and/or SSH can therefore be exploited.
An attacker must be authenticated before the system is exposed to this exploit.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(78596);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");
script_cve_id(
"CVE-2014-6271",
"CVE-2014-6277",
"CVE-2014-6278",
"CVE-2014-7169",
"CVE-2014-7186",
"CVE-2014-7187"
);
script_bugtraq_id(
70103,
70137,
70152,
70154,
70165,
70166
);
script_xref(name:"CISCO-BUG-ID", value:"CSCur01461");
script_xref(name:"IAVA", value:"2014-A-0142");
script_xref(name:"CISCO-SA", value:"cisco-sa-20140926-bash");
script_xref(name:"EDB-ID", value:"34765");
script_xref(name:"EDB-ID", value:"34766");
script_xref(name:"EDB-ID", value:"34777");
script_xref(name:"CERT", value:"252743");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/07/28");
script_xref(name:"CEA-ID", value:"CEA-2019-0240");
script_name(english:"Cisco TelePresence Video Communication Server Bash Remote Code Execution (Shellshock)");
script_set_attribute(attribute:"synopsis", value:
"The version of Cisco TelePresence Video Communication Server installed
on the remote host is affected by a command injection vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the version of Cisco
TelePresence Video Communication Server is affected by a command
injection vulnerability known as Shellshock in its included GNU Bash
shell. The vulnerability is due to the processing of trailing strings
after function definitions in the values of environment variables.
This allows a remote attacker to execute arbitrary code via
environment variable manipulation depending on the configuration of
the system. The API over HTTP(S) and/or SSH can therefore be
exploited.
An attacker must be authenticated before the system is exposed to this
exploit.");
script_set_attribute(attribute:"see_also", value:"http://seclists.org/oss-sec/2014/q3/650");
script_set_attribute(attribute:"see_also", value:"https://www.invisiblethreat.ca/post/shellshock/");
script_set_attribute(attribute:"see_also", value:"https://tools.cisco.com/bugsearch/bug/CSCur01461");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?df19d2c1");
script_set_attribute(attribute:"solution", value:
"Upgrade to version 7.2.4 / 8.1.2 / 8.2.2 / 8.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-7187");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'CUPS Filter Bash Environment Variable Code Injection (Shellshock)');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/09/24");
script_set_attribute(attribute:"patch_publication_date", value:"2014/10/17");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/21");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:telepresence_video_communication_server_software");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:telepresence_video_communication_server");
script_set_attribute(attribute:"cpe", value:"cpe:/h:cisco:telepresence_video_communication_server");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2014-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_telepresence_video_communication_server_detect.nbin");
script_require_keys("Cisco/TelePresence_VCS/Version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
prod = "Cisco TelePresence Video Communication Server";
version = get_kb_item_or_exit("Cisco/TelePresence_VCS/Version");
if (
version =~ "^6\." ||
(version =~ "^7\." && ver_compare(ver:version, fix:"7.2.4", strict:FALSE) < 0) ||
(version =~ "^8\.1\." && ver_compare(ver:version, fix:"8.1.2", strict:FALSE) < 0) ||
(version =~ "^8\.2\." && ver_compare(ver:version, fix:"8.2.2", strict:FALSE) < 0)
)
{
if (report_verbosity > 0)
{
report = '\n Installed version : ' + version +
'\n Fixed versions : 7.2.4 / 8.1.2 / 8.2.2 / 8.5' +
'\n';
security_hole(port:0, extra:report);
}
else security_hole(0);
}
else audit(AUDIT_INST_VER_NOT_VULN, prod, version);
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | telepresence_video_communication_server_software | cpe:/a:cisco:telepresence_video_communication_server_software | |
cisco | telepresence_video_communication_server | cpe:/a:cisco:telepresence_video_communication_server | |
cisco | telepresence_video_communication_server | cpe:/h:cisco:telepresence_video_communication_server |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
seclists.org/oss-sec/2014/q3/650
www.nessus.org/u?df19d2c1
tools.cisco.com/bugsearch/bug/CSCur01461
www.invisiblethreat.ca/post/shellshock/