Lucene search

K

EulerOS Virtualization 3.0.1.0 : thrift (EulerOS-SA-2019-1458)

EulerOS Virtualization 3.0.1.0 thrift security vulnerabilitie

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Huawei EulerOS: Security Advisory for thrift (EulerOS-SA-2019-1458)
23 Jan 202000:00
openvas
OpenVAS
Debian: Security Advisory (DLA-1662-1)
6 Feb 201900:00
openvas
OpenVAS
Huawei EulerOS: Security Advisory for thrift (EulerOS-SA-2021-1457)
5 Mar 202100:00
openvas
OSV
CVE-2018-11798
7 Jan 201917:29
osv
OSV
CGA-pmq8-4h9g-36mm
6 Jun 202412:28
osv
OSV
Apache Thrift Node.js static web server sandbox escape
17 Jan 201913:56
osv
OSV
libthrift-java - security update
6 Feb 201900:00
osv
OSV
Improper Input Validation in Apache Thrift
17 Jan 201913:56
osv
Veracode
Directory Traversal
8 Jan 201905:57
veracode
Veracode
Authentication Bypass
8 Jan 201902:29
veracode
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(124961);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");

  script_cve_id(
    "CVE-2018-11798",
    "CVE-2018-1320"
  );

  script_name(english:"EulerOS Virtualization 3.0.1.0 : thrift (EulerOS-SA-2019-1458)");
  script_summary(english:"Checks the rpm output for the updated packages.");

  script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS Virtualization host is missing multiple security
updates.");
  script_set_attribute(attribute:"description", value:
"According to the versions of the thrift packages installed, the
EulerOS Virtualization installation on the remote host is affected by
the following vulnerabilities :

  - The Apache Thrift Node.js static web server in versions
    0.9.2 through 0.11.0 have been determined to contain a
    security vulnerability in which a remote user has the
    ability to access files outside the set webservers
    docroot path.(CVE-2018-11798)

  - Apache Thrift Java client library versions 0.5.0
    through 0.11.0 can bypass SASL negotiation isComplete
    validation in the
    org.apache.thrift.transport.TSaslTransport class. An
    assert used to determine if the SASL handshake had
    successfully completed could be disabled in production
    settings making the validation
    incomplete.(CVE-2018-1320)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
  # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1458
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2772eb01");
  script_set_attribute(attribute:"solution", value:
"Update the affected thrift packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"patch_publication_date", value:"2019/05/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:thrift-lib-cpp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:thrift-lib-python");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:uvp:3.0.1.0");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Huawei Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/uvp_version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
uvp = get_kb_item("Host/EulerOS/uvp_version");
if (uvp != "3.0.1.0") audit(AUDIT_OS_NOT, "EulerOS Virtualization 3.0.1.0");
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i686 / x86_64", cpu);

flag = 0;

pkgs = ["thrift-lib-cpp-0.11.0-3",
        "thrift-lib-python-0.11.0-3"];

foreach (pkg in pkgs)
  if (rpm_check(release:"EulerOS-2.0", reference:pkg)) flag++;

if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "thrift");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo