In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code’s behavior.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(198233);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/14");
script_cve_id("CVE-2024-36472");
script_xref(name:"IAVA", value:"2024-A-0319");
script_name(english:"GNOME Shell <= 45.7 Code Execution in Portal Helper (CVE-2024-36472)");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on
network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently
loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript
code's behavior.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7688");
script_set_attribute(attribute:"solution", value:
"See vendor advisory.");
script_set_attribute(attribute:"agent", value:"unix");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-36472");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/29");
script_set_attribute(attribute:"patch_publication_date", value:"2024/05/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/31");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "command_builder_init.nasl", "gnome_shell_installed_nix.nbin");
script_require_keys("Host/local_checks_enabled", "Host/uname");
exit(0);
}
include('vcf.inc');
var app_info = vcf::get_app_info(app:'GNOME Shell');
var constraints = [
{'max_version': '45.7', 'fixed_display': 'See vendor advisory'}
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);