Lucene search

K
nessusThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.IBM_STORWIZE_CVE-2018-1775.NASL
HistoryJun 14, 2019 - 12:00 a.m.

IBM San Volume Controller / Storwize / FlashSystem Arbitrary File Read (CVE-2018-1775)

2019-06-1400:00:00
This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
22

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

31.7%

According to its self-reported version number, the IBM San Volume Controller, Storwize or FlashSystem is vulnerable to an arbitrary file read vulnerability which exists in the service assistant GUI. An authenticated, remote attacker can exploit this, to read arbitrary files and disclose sensitive information.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(125897);
  script_version("1.2");
  script_cvs_date("Date: 2019/10/18 23:14:15");

  script_cve_id("CVE-2018-1775");
  script_bugtraq_id(107187);
  script_xref(name:"IAVA", value:"2019-A-0190");

  script_name(english:"IBM San Volume Controller / Storwize / FlashSystem Arbitrary File Read (CVE-2018-1775)");
  script_summary(english:"Checks for vulnerable IBM firmware versions.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a arbitrary file read vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the IBM San Volume Controller, Storwize or FlashSystem is vulnerable to
an arbitrary file read vulnerability which exists in the service assistant GUI. An authenticated, remote attacker can
exploit this, to read arbitrary files and disclose sensitive information.");
  script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=ibm10872486");
  script_set_attribute(attribute:"solution", value:
"Upgrade to a firmware version 7.8.1.8, 8.1.3.3, 8.2.0.0, 8.2.1.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-1775");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/02/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/06/14");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:san_volume_controller_software");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:storwize_v5000_software");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:storwize_v7000_software");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:flashsystem_v9000_firmware");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ibm_storwize_detect.nbin");
  script_require_ports("Host/IBM/Storwize/version", "Host/IBM/Storwize/machine_major", "Host/IBM/Storwize/display_name");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

version = get_kb_item_or_exit("Host/IBM/Storwize/version");
# Everything we can get a machine major for is affected
machine_major = get_kb_item_or_exit("Host/IBM/Storwize/machine_major");
display_name = get_kb_item_or_exit("Host/IBM/Storwize/display_name");

if (version == UNKNOWN_VER)
  audit(AUDIT_UNKNOWN_APP_VER, display_name);

# 7.5.x < 7.8.1.8
# 8.0.x < 8.1.3.3
if (version =~ "^7\.[5-8]\.")
  fix = "7.8.1.8";
else if (version =~ "^8\.[01]\.")
  fix = "8.1.3.3";
else if (version =~ "^8\.2\.0\.")
  fix = "8.2.0.0";
else if (version =~ "^8\.2\.1\.")
  fix = "8.2.1.0";
else audit(AUDIT_DEVICE_NOT_VULN, display_name, version);

if (ver_compare(ver:version, fix:fix) < 0)
{
  report =
    '\n  Name              : ' + display_name +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_report_v4(severity:SECURITY_WARNING, port:0, extra:report);
}
else audit(AUDIT_DEVICE_NOT_VULN, display_name, version);
VendorProductVersionCPE
ibmsan_volume_controller_softwarecpe:/a:ibm:san_volume_controller_software
ibmstorwize_v5000_softwarecpe:/a:ibm:storwize_v5000_software
ibmstorwize_v7000_softwarecpe:/a:ibm:storwize_v7000_software
ibmflashsystem_v9000_firmwarecpe:/o:ibm:flashsystem_v9000_firmware

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

31.7%

Related for IBM_STORWIZE_CVE-2018-1775.NASL