Lucene search

K
nessusThis script is Copyright (C) 2013-2020 Recx Ltd.ORACLE_APEX_CVE-2012-1708.NASL
HistoryFeb 20, 2013 - 12:00 a.m.

Oracle Application Express (Apex) CVE-2012-1708

2013-02-2000:00:00
This script is Copyright (C) 2013-2020 Recx Ltd.
www.tenable.com
98

An unspecified vulnerability in versions 4.0 and 4.1 of the Application Express (Apex) component of the Oracle Database Server allows remote attackers to affect integrity via unpublished vectors.

# ---------------------------------------------------------------------------------
# (c) Recx Ltd 2009-2012
# http://www.recx.co.uk/
#
# Detection script for CVE-2012-1708
# Ref: https://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
# Oracle Application Express v4.0 < x < v4.1.1
#
#   Unspecified vulnerability in the Application Express component in Oracle
#   Database Server 4.0 and 4.1 allows remote attackers to affect integrity
#   via unknown vectors.
#
# Version 1.0
# ---------------------------------------------------------------------------------

include("compat.inc");

if (description)
{
  script_id(64713);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

  script_cve_id("CVE-2012-1708");
  script_bugtraq_id(53104);

  script_name(english:"Oracle Application Express (Apex) CVE-2012-1708");
  script_summary(english:"Checks whether vulnerable to CVE-2012-1708");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is running a vulnerable version of Oracle Apex.");
  script_set_attribute(attribute:"description", value:
"An unspecified vulnerability in versions 4.0 and 4.1 of the
Application Express (Apex) component of the Oracle Database Server
allows remote attackers to affect integrity via unpublished vectors.");
  script_set_attribute(attribute:"see_also", value:"http://www.oracle.com/technetwork/developer-tools/apex/index.html");
  script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html");
  script_set_attribute(attribute:"see_also", value:"https://www.recx.co.uk/downloads/Recx-Apex-CVE-2012-1708.pdf");
  script_set_attribute(attribute:"solution", value:
"Upgrade Application Express to at least version 4.1.1.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-1708");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/04/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/04/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/02/20");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:application_express");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2013-2020 Recx Ltd.");

  script_dependencies("oracle_apex_detect_version.nasl");
  script_require_keys("Oracle/Apex");
  script_require_ports("Services/www", 8080, 80, 443);

  exit(0);
}

include("global_settings.inc");
include("http_func.inc");
include("http_keepalive.inc");

function raise_finding(port, report)
{
  if(report_verbosity > 0)
    security_warning(port:port, extra:report);
  else security_warning(port);
}

port = get_http_port(default:8080, embedded:TRUE);

if (!get_port_state(port)) exit(0, "Port " + port + " is not open.");

version = get_kb_item("Oracle/Apex/"+port+"/Version");
if(!version) exit(0, "The 'Oracle/Apex/" + port + "/Version' KB item is not set.");

location = get_kb_item("Oracle/Apex/" + port + "/Location");
if(!location) exit(0, "The 'Oracle/Apex/" + port + "/Location' KB item is not set.");
url = build_url(qs:location, port:port);

if (version == "4.0" || version == "4.0.1" || version == "4.0.2" || version == "4.1")
{
  report = '\n  URL               : ' + url +
           '\n  Installed version : ' + version +
           '\n  Fixed version     : 4.1.1' + '\n';
  raise_finding(port:port, report:report);
  exit(0);
}

exit(0, "The Oracle Apex install at " + url + " is version " + version + " and is not affected.");
VendorProductVersionCPE
oracleapplication_expresscpe:/a:oracle:application_express
Related for ORACLE_APEX_CVE-2012-1708.NASL