Lucene search

K
nessusThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.GLASSFISH_CPU_JAN_2017.NASL
HistoryJan 19, 2017 - 12:00 a.m.

Oracle GlassFish Server 2.1.1.x < 2.1.1.30 / 3.0.1.x < 3.0.1.15 / 3.1.2.x < 3.1.2.16 Multiple Vulnerabilities (January 2017 CPU)

2017-01-1900:00:00
This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
88

According to its self-reported version number, the Oracle GlassFish Server running on the remote host is 2.1.1.x prior to 2.1.1.30, 3.0.1.x prior to 3.0.1.15, or 3.1.2.x prior to 3.1.2.16. It is, therefore, affected by multiple vulnerabilities :

  • An unspecified flaw exists in the Security subcomponent that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2016-5528)

  • An unspecified flaw exists in the Administration subcomponent that allows a local attacker attacker to disclose sensitive information. Note that this vulnerability does not affect the 2.1.1.x version branch. (CVE-2017-3239)

  • An unspecified flaw exists in the Core subcomponent that allows an unauthenticated, remote attacker to perform unauthorized updates, inserts, or deletion of data over SMTP. (CVE-2017-3247)

  • An unspecified flaw exists in the Security subcomponent that allows an unauthenticated, remote attacker to perform unauthorized updates, inserts, or deletion of data over LDAP. Additionally, the attacker can potentially cause a partial denial of service condition.
    (CVE-2017-3249)

  • An unspecified flaw exists in the Security subcomponent that allows an unauthenticated, remote attacker to perform unauthorized updates, inserts, or deletion of data over HTTP. Additionally, the attacker can potentially cause a partial denial of service condition.
    (CVE-2017-3250)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(96624);
  script_version("1.8");
  script_cvs_date("Date: 2019/11/13");

  script_cve_id(
    "CVE-2016-5528",
    "CVE-2017-3239",
    "CVE-2017-3247",
    "CVE-2017-3249",
    "CVE-2017-3250"
  );
  script_bugtraq_id(
    95478,
    95480,
    95483,
    95484,
    95493
  );

  script_name(english:"Oracle GlassFish Server 2.1.1.x < 2.1.1.30 / 3.0.1.x < 3.0.1.15 / 3.1.2.x < 3.1.2.16 Multiple Vulnerabilities (January 2017 CPU)");
  script_summary(english:"Checks the version of Oracle GlassFish.");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Oracle GlassFish
Server running on the remote host is 2.1.1.x prior to 2.1.1.30,
3.0.1.x prior to 3.0.1.15, or 3.1.2.x prior to 3.1.2.16. It is,
therefore, affected by multiple vulnerabilities : 

  - An unspecified flaw exists in the Security subcomponent 
    that allows an unauthenticated, remote attacker to
    execute arbitrary code. (CVE-2016-5528)

  - An unspecified flaw exists in the Administration
    subcomponent that allows a local attacker attacker to
    disclose sensitive information. Note that this
    vulnerability does not affect the 2.1.1.x version
    branch. (CVE-2017-3239)

  - An unspecified flaw exists in the Core subcomponent that
    allows an unauthenticated, remote attacker to perform
    unauthorized updates, inserts, or deletion of data over
    SMTP. (CVE-2017-3247)

  - An unspecified flaw exists in the Security subcomponent
    that allows an unauthenticated, remote attacker to
    perform unauthorized updates, inserts, or deletion of
    data over LDAP. Additionally, the attacker can
    potentially cause a partial denial of service condition.
    (CVE-2017-3249) 

  - An unspecified flaw exists in the Security subcomponent
    that allows an unauthenticated, remote attacker to
    perform unauthorized updates, inserts, or deletion of
    data over HTTP. Additionally, the attacker can
    potentially cause a partial denial of service condition.
    (CVE-2017-3250)");
  # http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?89a8e429");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Oracle GlassFish Server version 2.1.1.30 / 3.0.1.15 /
3.1.2.16 or later as referenced in the January 2017 Oracle Critical
Patch Update advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3250");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/17");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/01/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:glassfish_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("glassfish_detect.nasl");
  script_require_keys("www/glassfish");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("audit.inc");
include("glassfish.inc");

#
# Main
#

# Check for GlassFish
get_kb_item_or_exit('www/glassfish');

port = get_glassfish_port(default:8080);

# Get the version number out of the KB.
ver = get_kb_item_or_exit("www/" + port + "/glassfish/version");
banner = get_kb_item_or_exit("www/" + port + "/glassfish/source");
pristine = get_kb_item_or_exit("www/" + port + "/glassfish/version/pristine");

# Set appropriate fixed versions.
if      (ver =~ "^3\.1\.2") fix = "3.1.2.16";
else if (ver =~ "^3\.0\.1") fix = "3.0.1.15";
else if (ver =~ "^2\.1\.1") fix = "2.1.1.30";

if (!empty_or_null(ver) && ver_compare(ver:ver, fix:fix, strict:FALSE) < 0)
{
  report =
    '\n  Version source    : ' + banner +
    '\n  Installed version : ' + pristine +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
}
else audit(AUDIT_LISTEN_NOT_VULN, "Oracle GlassFish", port, pristine);
VendorProductVersionCPE
oracleglassfish_servercpe:/a:oracle:glassfish_server