5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
48.3%
The version of IBM Integration Bus (formerly known as IBM WebSphere Message Broker) installed on the remote host is 8.x prior to 8.0.0.9, 9.x prior to 9.0.0.9, or 10.x prior to 10.0.0.10. It is, therefore, affected by a vulnerability that could allow an unauthorized user to obtain sensitive information about software versions, which could lead to further attacks.)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(103674);
script_version("1.5");
script_cvs_date("Date: 2019/01/04 8:36:16");
script_cve_id("CVE-2017-1126");
script_bugtraq_id(101104);
script_name(english:"IBM Integration Bus 8.x < 8.0.0.9 / 9.x < 9.0.0.9 / 10.x < 10.0.0.10 Multiple Vulnerabilities");
script_summary(english:"Checks the version of IBM Integration Bus.");
script_set_attribute(attribute:"synopsis", value:
"An enterprise service bus application installed on the remote host is
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of IBM Integration Bus (formerly known as IBM WebSphere
Message Broker) installed on the remote host is 8.x prior to 8.0.0.9,
9.x prior to 9.0.0.9, or 10.x prior to 10.0.0.10. It is, therefore,
affected by a vulnerability that could allow an unauthorized user to
obtain sensitive information about software versions, which could
lead to further attacks.)");
script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg22008470");
script_set_attribute(attribute:"solution", value:
"Upgrade to IBM Integration Bus version 8.0.0.9 / 9.0.0.9 / 10.0.0.10 or
later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-1126");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/30");
script_set_attribute(attribute:"patch_publication_date", value:"2017/06/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_message_broker");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:integration_bus");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ibm_integration_bus_installed.nbin");
script_require_keys("installed_sw/IBM Integration Bus");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");
app = 'IBM Integration Bus';
get_install_count(app_name:app, exit_if_zero:TRUE);
install = get_single_install(app_name: app, exit_if_unknown_ver: TRUE);
path = install['path'];
version = install['version'];
if (version =~ "^10\.")
fix = "10.0.0.10";
else if (version =~ "^9\.")
fix = "9.0.0.9";
else if (version =~ "^8\.")
fix = "8.0.0.9";
else
audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
if (ver_compare(ver:version, fix:fix, strict:FALSE) >= 0)
audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
port = get_kb_item("SMB/transport");
if (!port) port = 445;
order = make_list("Installed version", "Fixed version", "Path");
report = make_array(
order[0], version,
order[1], fix,
order[2], path
);
report = report_items_str(report_items:report, ordered_fields:order);
security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | websphere_message_broker | cpe:/a:ibm:websphere_message_broker | |
ibm | integration_bus | cpe:/a:ibm:integration_bus |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
0.001 Low
EPSS
Percentile
48.3%