Lucene search

K
nessusThis script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2017.NASL
HistoryJul 21, 2017 - 12:00 a.m.

Oracle Primavera Gateway Multiple Vulnerabilities (July 2017 CPU)

2017-07-2100:00:00
This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
19

According to its self-reported version number, the Oracle Primavera Gateway installation running on the remote web server is prior to 14.2.3, 15.x prior to 15.2.12, or 16.x prior to 16.2.4. It is, therefore, affected by the following vulnerabilities :

  • A remote code execution vulnerability exists in the Primavera Integration (Standard) component, specifically in Apache Standard Taglib, due to an XML external entity (XXE) injection flaw when parsing XML data because of an incorrectly configured XML parser accepting XML external entities from untrusted sources. An unauthenticated, remote attacker can exploit this, via specially crafted XML data, to disclose resources on the target system or utilize XSLT extensions to execute arbitrary code.
    (CVE-2015-0254)

  • A remote code execution vulnerability exists in the Primavera Integration (Groovy) component due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this to execute arbitrary code on the target host.
    (CVE-2016-6814)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(101899);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/29");

  script_cve_id("CVE-2015-0254", "CVE-2016-6814");
  script_bugtraq_id(72809, 95429);
  script_xref(name:"CERT", value:"576313");

  script_name(english:"Oracle Primavera Gateway Multiple Vulnerabilities (July 2017 CPU)");
  script_summary(english:"Checks the version of Oracle Primavera Gateway.");

  script_set_attribute(attribute:"synopsis", value:
"An application running on the remote web server is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Oracle Primavera
Gateway installation running on the remote web server is prior to
14.2.3, 15.x prior to 15.2.12, or 16.x prior to 16.2.4. It is,
therefore, affected by the following vulnerabilities :

  - A remote code execution vulnerability exists in the
    Primavera Integration (Standard) component, specifically
    in Apache Standard Taglib, due to an XML external entity
    (XXE) injection flaw when parsing XML data because of an
    incorrectly configured XML parser accepting XML external
    entities from untrusted sources. An unauthenticated,
    remote attacker can exploit this, via specially crafted
    XML data, to disclose resources on the target system or
    utilize XSLT extensions to execute arbitrary code.
    (CVE-2015-0254)

  - A remote code execution vulnerability exists in the
    Primavera Integration (Groovy) component due to unsafe
    deserialize calls of unauthenticated Java objects to the
    Apache Commons Collections (ACC) library. An
    unauthenticated, remote attacker can exploit this to
    execute arbitrary code on the target host.
    (CVE-2016-6814)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  # http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76f5def7");
  # https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9c6d83db");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Oracle Primavera Gateway version 14.2.3 / 15.2.12 / 16.2.4
or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-6814");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"in_the_news", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/01/28");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/07/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/21");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:primavera_gateway");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("oracle_primavera_gateway.nbin");
  script_require_keys("installed_sw/Oracle Primavera Gateway");
  script_require_ports("Services/www", 8006);

  exit(0);
}

include("http.inc");
include("vcf.inc");

get_install_count(app_name:"Oracle Primavera Gateway", exit_if_zero:TRUE);

port = get_http_port(default:8006);

app_info = vcf::get_app_info(app:"Oracle Primavera Gateway", port:port);

vcf::check_granularity(app_info:app_info, sig_segments:2);

constraints = [
  { "max_version" : "14.2.3", "fixed_version" : "14.2.3" },
  { "min_version" : "15.0.0", "max_version" : "15.2.12", "fixed_version" : "15.2.12" },
  { "min_version" : "16.0.0", "max_version" : "16.2.5", "fixed_version" : "16.2.5" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE); 
VendorProductVersionCPE
oracleprimavera_gatewaycpe:/a:oracle:primavera_gateway