The Microsoft Dynamics NAV install is missing a security update. It is, therefore, affected by a cross site scripting (XSS) vulnerability due to improper validation of user-supplied input. An authenticated attacker can exploit this, by entering specially crafted URLs in the Links and Notes feature, in order to disclose information.
Note that Nessus has not attempted to exploit this issue but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable Network Security, Inc.
##
include('compat.inc');
if (description)
{
script_id(146419);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/22");
script_cve_id("CVE-2021-1724");
script_xref(name:"MSKB", value:"4602915");
script_xref(name:"MSFT", value:"MS21-4602915");
script_name(english:"Security Updates for Microsoft Dynamics NAV (Feb 2021)");
script_set_attribute(attribute:"synopsis", value:
"The Microsoft Dynamics NAV install is missing a security update.");
script_set_attribute(attribute:"description", value:
"The Microsoft Dynamics NAV install is missing a security update. It is, therefore, affected by a cross site scripting
(XSS) vulnerability due to improper validation of user-supplied input. An authenticated attacker can exploit this, by
entering specially crafted URLs in the Links and Notes feature, in order to disclose information.
Note that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported
version number.");
script_set_attribute(attribute:"see_also", value:"https://support.microsoft.com/en-us/help/4602915");
script_set_attribute(attribute:"solution", value:
"The solution varies for different versions of Microsoft Dynamics NAV :
- Dynamics NAV 2015: Install the update package from 4602915
- Dynamics NAV 2016: Install Cumulative Update 64 or later
- Dynamics NAV 2017: Install Cumulative Update 51 or later
- Dynamics NAV 2018: Install Cumulative Update 38 or later");
script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-1724");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2021/02/09");
script_set_attribute(attribute:"patch_publication_date", value:"2021/02/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/02/11");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"x-cpe:/a:microsoft:dynamics_nav");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("microsoft_dynamics_nav_server_win_installed.nbin");
script_require_keys("installed_sw/Microsoft Dynamics NAV Server");
script_require_ports(139, 445);
exit(0);
}
include('vcf.inc');
app = 'Microsoft Dynamics NAV Server';
app_info = vcf::get_app_info(app:app, win_local:TRUE);
constraints = [
{ 'min_version' : '8.0', 'fixed_version' : '8.0.52075.0' }, # 2015
{ 'min_version' : '9.0', 'fixed_version' : '9.0.52091.0' }, # 2016
{ 'min_version' : '10.0', 'fixed_version' : '10.0.30443.0' }, # 2017
{ 'min_version' : '11.0', 'fixed_version' : '11.0.46360.0' } # 2018
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_NOTE,
flags:{'xss':TRUE}
);
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | dynamics_nav | x-cpe:/a:microsoft:dynamics_nav |