Lucene search

K
nessusThis script is Copyright (C) 2005-2022 Tenable Network Security, Inc.HYLAFAX_BYPASS.NASL
HistoryJan 11, 2005 - 12:00 a.m.

HylaFAX Remote Access Control Bypass

2005-01-1100:00:00
This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.
www.tenable.com
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

76.4%

The remote host is running HylaFAX, a fax transmission software.

It is reported that HylaFAX is prone to an access control bypass vulnerability. An attacker, exploiting this flaw, may be able to gain unauthorized access to the service.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(16126);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2004-1182");
  script_bugtraq_id(12227);

  script_name(english:"HylaFAX Remote Access Control Bypass");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains an application that is affected by an access
control bypass vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host is running HylaFAX, a fax transmission software.

It is reported that HylaFAX is prone to an access control bypass
vulnerability. An attacker, exploiting this flaw, may be able to gain
unauthorized access to the service.");
  script_set_attribute(attribute:"see_also", value:"http://bugs.hylafax.org//show_bug.cgi?id=610");
  script_set_attribute(attribute:"solution", value:
"Upgrade to version 4.2.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_publication_date", value:"2005/01/11");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hylafax:hylafax");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2005-2022 Tenable Network Security, Inc.");

  script_dependencies("hylafax_detect.nbin");
  script_require_keys("hylafax/installed", "hylafax/version", "Settings/ParanoidReport");
  script_require_ports("Services/hylafax", 4559);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

port = get_service(svc:"hylafax", default:4559, exit_on_fail:TRUE);

if (report_paranoia < 2) audit(AUDIT_PARANOID);

banner = get_kb_item_or_exit("hylafax/banner");
version = get_kb_item_or_exit("hylafax/version");

fixed = '4.2.1';

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (
  ver[0] < 4 ||
  ver[0] == 4 && ver[1] < 2 ||
  ver[0] == 4 && ver[1] == 2 && ver[2] < 1 ||
  ver[0] == 4 && ver[1] == 2 && ver[2] == 1 && ("beta" >< version)
  )
{
 if (report_verbosity > 0)
  {
    report =
      '\n  Source            : ' + banner +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fixed +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_LISTEN_NOT_VULN, "HylaFAX+", port, version);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.005

Percentile

76.4%