Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.MANAGEENGINE_OPMANAGER_CVE-2023-29505.NASL
HistoryAug 10, 2023 - 12:00 a.m.

ManageEngine OpManager Plus < 12.7.109 / 12.7.110 < 12.7.120 / 12.7.121 < 12.7.131 Cross-Site WebSocket Hijacking

2023-08-1000:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
51
manageengine opmanager
cross-site websocket hijacking
vulnerability
version 12.7.109
version 12.7.110
version 12.7.120
version 12.7.121
version 12.7.131

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

56.0%

The version of ManageEngine OpManager running on the remote web server is prior to 12.7.109, or version 12.7.110 prior to 12.7.120, or version 12.7.121 prior to 12.7.131. It therefore has a vulnerability in the WebSocket endpoint that allows Cross-site WebSocket hijacking.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(179655);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/28");

  script_cve_id("CVE-2023-29505");
  script_xref(name:"IAVA", value:"2023-A-0395-S");

  script_name(english:"ManageEngine OpManager Plus < 12.7.109 / 12.7.110 < 12.7.120 / 12.7.121 < 12.7.131 Cross-Site WebSocket Hijacking");

  script_set_attribute(attribute:"synopsis", value:
"An Active Directory management application running on the remote host is affected by an authenticated XML 
external entity injection vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of ManageEngine OpManager running on the remote web server is prior to 12.7.109, or version 12.7.110 prior to 12.7.120, or 
version 12.7.121 prior to 12.7.131. It therefore has a vulnerability in the WebSocket endpoint that allows Cross-site WebSocket hijacking.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported 
version number.");
  # https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_127131
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?980f64b4");
  # https://www.manageengine.com/itom/advisory/cve-2023-29505.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1981ec1f");
  # https://excellium-services.com/cert-xlm-advisory/CVE-2023-29505/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4984a655");
  script_set_attribute(attribute:"solution", value:
"Upgrade ManageEngine OpManager according to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-29505");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/08/03");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/06/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/08/10");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:zohocorp:manageengine_opmanager");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("manageengine_opmanager_detect.nbin");
  script_require_keys("installed_sw/ManageEngine OpManager");
  script_require_ports("Services/www", 8060);

  exit(0);
}

include('vcf.inc');
include('vcf_extras_zoho.inc');
include('http.inc');

var appname = 'ManageEngine OpManager';

var port = get_http_port(default:8060);

var app_info = vcf::zoho::fix_parse::get_app_info(app:appname, port:port, webapp:TRUE);

var constraints = [
  {'fixed_version': '127109', 'fixed_display': 'See vendor advisory'}, # Below version 127109
  {'min_version': '127110', 'fixed_version': '127120', 'fixed_display': 'See vendor advisory'}, # From version 127110 to 127119
  {'min_version': '127121', 'fixed_version': '127131', 'fixed_display': 'See vendor advisory'}  # From version 127121 to 127130
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_HOLE
);

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

High

EPSS

0.002

Percentile

56.0%

Related for MANAGEENGINE_OPMANAGER_CVE-2023-29505.NASL