Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.GNOME_SHELL_CVE-2024-36472.NASL
HistoryMay 31, 2024 - 12:00 a.m.

GNOME Shell <= 45.7 Code Execution in Portal Helper (CVE-2024-36472)

2024-05-3100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
46
gnome shell
code execution
vulnerability
portal helper
scanner
cve-2024-36472
file data
nasl

6.2 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code’s behavior.

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(198233);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/14");

  script_cve_id("CVE-2024-36472");
  script_xref(name:"IAVA", value:"2024-A-0319");

  script_name(english:"GNOME Shell <= 45.7 Code Execution in Portal Helper (CVE-2024-36472)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on 
network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently 
loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript 
code's behavior.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7688");
  script_set_attribute(attribute:"solution", value:
"See vendor advisory.");
  script_set_attribute(attribute:"agent", value:"unix");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-36472");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/31");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl", "command_builder_init.nasl", "gnome_shell_installed_nix.nbin");
  script_require_keys("Host/local_checks_enabled", "Host/uname");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::get_app_info(app:'GNOME Shell');

var constraints = [
  {'max_version': '45.7', 'fixed_display': 'See vendor advisory'}
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);

6.2 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Related for GNOME_SHELL_CVE-2024-36472.NASL