Lucene search

K
nessusThis script is Copyright (C) 2011-2021 Tenable Network Security, Inc.FEDORA_2011-15833.NASL
HistoryNov 26, 2011 - 12:00 a.m.

Fedora 16 : libsocialweb-0.25.20-1.fc16 / rest-0.7.12-1.fc16 (2011-15833)

2011-11-2600:00:00
This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.
www.tenable.com
8

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

59.8%

CVE-2011-4129

A security flaw was found in the way the libsocialweb, a social network data aggregator, performed its initialization when this service start was initiated by the dbus daemon. Due to a deficiency in a way the libsocialweb service was initialized, an untrusted (non-SSL) network connection has been opened to remote Twitter service servers without explicit approval of the user, running the libsocialweb service on the local host. A remote attacker could use this flaw to conduct various MITM attacks and potentially alter integrity of the user account in question.

  • libsocialweb: The views will try and fetch content from the web service even if they aren’t configured.

  • rest: enforce that the SSL certificate is valid

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory 2011-15833.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(56940);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");

  script_cve_id("CVE-2011-4129");
  script_xref(name:"FEDORA", value:"2011-15833");

  script_name(english:"Fedora 16 : libsocialweb-0.25.20-1.fc16 / rest-0.7.12-1.fc16 (2011-15833)");
  script_summary(english:"Checks rpm output for the updated packages.");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Fedora host is missing one or more security updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"CVE-2011-4129

A security flaw was found in the way the libsocialweb, a social
network data aggregator, performed its initialization when this
service start was initiated by the dbus daemon. Due to a deficiency in
a way the libsocialweb service was initialized, an untrusted (non-SSL)
network connection has been opened to remote Twitter service servers
without explicit approval of the user, running the libsocialweb
service on the local host. A remote attacker could use this flaw to
conduct various MITM attacks and potentially alter integrity of the
user account in question.

  - libsocialweb: The views will try and fetch content from
    the web service even if they aren't configured.

  - rest: enforce that the SSL certificate is valid

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.redhat.com/show_bug.cgi?id=752022"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2011-November/069898.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?7ae11894"
  );
  # https://lists.fedoraproject.org/pipermail/package-announce/2011-November/069899.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?f1e60201"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected libsocialweb and / or rest packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:libsocialweb");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:rest");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:16");

  script_set_attribute(attribute:"patch_publication_date", value:"2011/11/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/11/26");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.");
  script_family(english:"Fedora Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^16([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 16.x", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);

flag = 0;
if (rpm_check(release:"FC16", reference:"libsocialweb-0.25.20-1.fc16")) flag++;
if (rpm_check(release:"FC16", reference:"rest-0.7.12-1.fc16")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsocialweb / rest");
}
VendorProductVersionCPE
fedoraprojectfedoralibsocialwebp-cpe:/a:fedoraproject:fedora:libsocialweb
fedoraprojectfedorarestp-cpe:/a:fedoraproject:fedora:rest
fedoraprojectfedora16cpe:/o:fedoraproject:fedora:16

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

59.8%