Lucene search

K
nessusThis script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.FEDORA_2018-ACFCE682F4.NASL
HistoryJan 03, 2019 - 12:00 a.m.

Fedora 28 : uwsgi (2018-acfce682f4)

2019-01-0300:00:00
This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
14

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.949

Percentile

99.3%

  • Fix building in Rawhide (#1556525) (Jakub Jelen)

    • Disable tcp_wrappers for Fedora 28 and newer (Jakub Jelen)

  • Modernize and generalize building of Python subpackages :

  • replace python with python2

  • use appropriate macros for when refering to Python 3

  • prefix Python-dependent plugins with the version of Python they are built with

  • Also build Python 3 subpackages for the other Python 3 version in EPEL7


  • Build Python 3 version(s) of gevent plugin on Fedora and EPEL7

  • Build Python 3 version of greenlet plugin on Fedora and EPEL7

  • Build Python 2 version of greenlet plugin on EPEL7

  • Always build Python 3 version of tornado plugin when building with Python 3 (drop python3_tornado build conditional)


  • Latest upstream (rhbz#1549354)

  • Enable uwsgi-plugin-coroae on EL7

  • Use systemd tmpfiles to create /run/uwsgi with group write permissions (rhbz#1427303)

  • Use /var/run/uwsgi when not using systemd

  • Build with versioned python command

  • Remove %%config from systemd unit file

  • Disable greenlet plugin on EL7

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Fedora Security Advisory FEDORA-2018-acfce682f4.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(120701);
  script_version("1.9");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/01");

  script_cve_id("CVE-2018-7490");
  script_xref(name:"FEDORA", value:"2018-acfce682f4");

  script_name(english:"Fedora 28 : uwsgi (2018-acfce682f4)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Fedora host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"- Fix building in Rawhide (#1556525) (Jakub Jelen)

  - Disable tcp_wrappers for Fedora 28 and newer (Jakub
    Jelen)

---

  - Modernize and generalize building of Python 
subpackages :

  - replace python with python2

  - use appropriate macros for when refering to Python 3

  - prefix Python-dependent plugins with the version of
    Python they are built with

  - Also build Python 3 subpackages for the other Python 3
    version in EPEL7

---

  - Build Python 3 version(s) of gevent plugin on Fedora and
    EPEL7

  - Build Python 3 version of greenlet plugin on Fedora and
    EPEL7

  - Build Python 2 version of greenlet plugin on EPEL7

  - Always build Python 3 version of tornado plugin when
    building with Python 3 (drop python3_tornado build
    conditional)

---

  - Latest upstream (rhbz#1549354)

  - Enable uwsgi-plugin-coroae on EL7

  - Use systemd tmpfiles to create /run/uwsgi with group
    write permissions (rhbz#1427303)

  - Use /var/run/uwsgi when not using systemd

  - Build with versioned python command

  - Remove %%config from systemd unit file

  - Disable greenlet plugin on EL7

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.");
  script_set_attribute(attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-acfce682f4");
  script_set_attribute(attribute:"solution", value:
"Update the affected uwsgi package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-7490");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"d2_elliot_name", value:"uWSGI Path Traversal File Disclosure");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/02/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/07/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:uwsgi");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:28");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Fedora Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^28([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 28", "Fedora " + os_ver);

if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);


flag = 0;
if (rpm_check(release:"FC28", reference:"uwsgi-2.0.17.1-1.fc28")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "uwsgi");
}

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.7

Confidence

High

EPSS

0.949

Percentile

99.3%