Lucene search

K
nessusThis script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.SL_20170817_GIT_ON_SL6_X.NASL
HistoryAug 18, 2017 - 12:00 a.m.

Scientific Linux Security Update : git on SL6.x i386/x86_64 (20170817)

2017-08-1800:00:00
This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

Security Fix(es) :

  • A shell command injection flaw related to the handling of ‘ssh’ URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a ‘clone’ action on a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000117)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(102576);
  script_version("3.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2017-1000117");

  script_name(english:"Scientific Linux Security Update : git on SL6.x i386/x86_64 (20170817)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Scientific Linux host is missing one or more security
updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Security Fix(es) :

  - A shell command injection flaw related to the handling
    of 'ssh' URLs has been discovered in Git. An attacker
    could use this flaw to execute shell commands with the
    privileges of the user running the Git client, for
    example, when performing a 'clone' action on a malicious
    repository or a legitimate repository containing a
    malicious commit. (CVE-2017-1000117)"
  );
  # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1708&L=scientific-linux-errata&F=&S=&P=1146
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?0cd271a0"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Malicious Git HTTP Server For CVE-2017-1000117');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:emacs-git");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:emacs-git-el");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-all");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-cvs");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-daemon");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-email");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-gui");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:git-svn");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:gitk");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:gitweb");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:perl-Git");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/08/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/18");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"Scientific Linux Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 6.x", "Scientific Linux " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);


flag = 0;
if (rpm_check(release:"SL6", reference:"emacs-git-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"emacs-git-el-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-all-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-cvs-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-daemon-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-debuginfo-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-email-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-gui-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"git-svn-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"gitk-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"gitweb-1.7.1-9.el6_9")) flag++;
if (rpm_check(release:"SL6", reference:"perl-Git-1.7.1-9.el6_9")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "emacs-git / emacs-git-el / git / git-all / git-cvs / git-daemon / etc");
}
VendorProductVersionCPE
fermilabscientific_linuxemacs-gitp-cpe:/a:fermilab:scientific_linux:emacs-git
fermilabscientific_linuxemacs-git-elp-cpe:/a:fermilab:scientific_linux:emacs-git-el
fermilabscientific_linuxgitp-cpe:/a:fermilab:scientific_linux:git
fermilabscientific_linuxgit-allp-cpe:/a:fermilab:scientific_linux:git-all
fermilabscientific_linuxgit-cvsp-cpe:/a:fermilab:scientific_linux:git-cvs
fermilabscientific_linuxgit-daemonp-cpe:/a:fermilab:scientific_linux:git-daemon
fermilabscientific_linuxgit-debuginfop-cpe:/a:fermilab:scientific_linux:git-debuginfo
fermilabscientific_linuxgit-emailp-cpe:/a:fermilab:scientific_linux:git-email
fermilabscientific_linuxgit-guip-cpe:/a:fermilab:scientific_linux:git-gui
fermilabscientific_linuxgit-svnp-cpe:/a:fermilab:scientific_linux:git-svn
Rows per page:
1-10 of 141