EulerOS 2.0 SP8 mod_security vulnerabilit
Reporter | Title | Published | Views | Family All 35 |
---|---|---|---|---|
![]() | EulerOS 2.0 SP5 : mod_security (EulerOS-SA-2022-1332) | 21 Mar 202200:00 | – | nessus |
![]() | Debian DSA-5023-1 : modsecurity-apache - security update | 19 Dec 202100:00 | – | nessus |
![]() | Debian DLA-3031-1 : modsecurity-apache - LTS security update | 29 May 202200:00 | – | nessus |
![]() | Ubuntu 16.04 ESM / 18.04 ESM / 20.04 LTS / 22.04 ESM : ModSecurity vulnerabilities (USN-6370-1) | 14 Sep 202300:00 | – | nessus |
![]() | openSUSE 15 Security Update : modsecurity (openSUSE-SU-2023:0257-1) | 26 Sep 202300:00 | – | nessus |
![]() | openSUSE 15 Security Update : modsecurity (openSUSE-SU-2023:0269-1) | 27 Sep 202300:00 | – | nessus |
![]() | Oracle HTTP Server (Jan 2023 CPU) | 23 Jan 202300:00 | – | nessus |
![]() | Exploit for Uncontrolled Recursion in Trustwave Modsecurity | 20 Nov 202218:01 | – | githubexploit |
![]() | Updated apache-mod_security packages fix security vulnerability | 22 Dec 202102:27 | – | mageia |
![]() | CVE-2021-42717 | 7 Dec 202122:15 | – | cve |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(159260);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/03");
script_cve_id("CVE-2021-42717");
script_name(english:"EulerOS 2.0 SP8 : mod_security (EulerOS-SA-2022-1355)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the versions of the mod_security package installed, the EulerOS installation on the remote host is affected
by the following vulnerabilities :
- ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with
nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests.
Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes
for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly
vulnerable: the affected versions include 2.8.0 through 2.9.4. (CVE-2021-42717)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security
advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional
issues.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2022-1355
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c65ff4c1");
script_set_attribute(attribute:"solution", value:
"Update the affected mod_security packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-42717");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/12/07");
script_set_attribute(attribute:"patch_publication_date", value:"2022/03/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/03/28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:mod_security");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var release = get_kb_item("Host/EulerOS/release");
if (isnull(release) || release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
var sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(8)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
var flag = 0;
var pkgs = [
"mod_security-2.9.2-6.h2.eulerosv2r8"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"8", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_security");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo