Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.MANAGEENGINE-SUPPORTCENTER-CVE-2024-27314.NASL
HistoryMay 24, 2024 - 12:00 a.m.

ManageEngine SupportCenter Plus < 14.7 Build 14720

2024-05-2400:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
4
manageengine supportcenter plus
vulnerability
stored cross-site scripting
xss
sdadmin role
custom actions menu
cve-2024-27314
remote host
nessus scanner

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

3.4 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

The version of ManageEngine SupportCenter Plus installed on the remote host is prior to 14.7 Build 14720. It is, therefore, affected by a vulnerability as referenced in the support-center_cve-2024-27314 advisory.

  • A stored cross-site scripting (XSS) vulnerability allowed users with the SDAdmin role to inject a malicious JavaScript in the Custom Actions menu on the request details page. The script is executed when a user opens a request, accesses the custom menu, and clicks on the button with the Execute script action type. (CVE-2024-27314)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(197904);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");

  script_cve_id("CVE-2024-27314");
  script_xref(name:"IAVA", value:"2024-A-0312");

  script_name(english:"ManageEngine SupportCenter Plus < 14.7 Build 14720");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts an application that is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of ManageEngine SupportCenter Plus installed on the remote host is prior to 14.7 Build 14720. It is,
therefore, affected by a vulnerability as referenced in the support-center_cve-2024-27314 advisory.

  - A stored cross-site scripting (XSS) vulnerability allowed users with the SDAdmin role to inject a
    malicious JavaScript in the Custom Actions menu on the request details page. The script is executed when a
    user opens a request, accesses the custom menu, and clicks on the button with the Execute script action
    type. (CVE-2024-27314)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://manageengine.com/products/service-desk/cve-2024-27314.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to ManageEngine SupportCenter Plus version 14.7 Build 14720 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-27314");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/24");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:manageengine:supportcenter_plus");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("manageengine_supportcenter_detect.nasl");
  script_require_keys("installed_sw/ManageEngine SupportCenter");
  script_require_ports("Services/www", 8080);

  exit(0);
}

include('vcf_extras_zoho.inc');
include('http.inc');
var port = get_http_port(default:8080);
var appname = 'ManageEngine SupportCenter';

var app_info = vcf::zoho::fix_parse::get_app_info(app:appname, port:port);

var constraints = [
  { 'max_version' : '14710', 'fixed_version' : '14720', 'fixed_display' : '14.7 Build 14720' }
];
vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_NOTE,
    flags:{'xss':TRUE}
);
VendorProductVersionCPE
manageenginesupportcenter_pluscpe:/a:manageengine:supportcenter_plus

2.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

3.4 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for MANAGEENGINE-SUPPORTCENTER-CVE-2024-27314.NASL