Lucene search

K
nessusThis script is Copyright (C) 2012-2024 Tenable Network Security, Inc.SYMANTEC_MESSAGE_FILTER_SYM12-010.NASL
HistoryJul 03, 2012 - 12:00 a.m.

Symantec Message Filter Multiple Vulnerabilities (SYM12-010)

2012-07-0300:00:00
This script is Copyright (C) 2012-2024 Tenable Network Security, Inc.
www.tenable.com
8

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.4 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.0%

The version of Brightmail Control Center (the web management interface for Symantec Message Filter) hosted on the remote web server has the following vulnerabilities :

  • Multiple information disclosure vulnerabilities.
    (CVE-2012-0300)

  • Session fixation. (CVE-2012-0301)

  • Unspecified cross-site scripting. (CVE-2012-0302)

  • Unspecified cross-site request forgery. (CVE-2012-0303)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(59836);
  script_version("1.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");

  script_cve_id(
    "CVE-2012-0300",
    "CVE-2012-0301",
    "CVE-2012-0302",
    "CVE-2012-0303"
  );
  script_bugtraq_id(
    54133,
    54134,
    54135,
    54136
  );

  script_name(english:"Symantec Message Filter Multiple Vulnerabilities (SYM12-010)");

  script_set_attribute(attribute:"synopsis", value:
"A web management interface hosted on the remote web server has
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Brightmail Control Center (the web management interface
for Symantec Message Filter) hosted on the remote web server has the
following vulnerabilities :

  - Multiple information disclosure vulnerabilities.
    (CVE-2012-0300)

  - Session fixation. (CVE-2012-0301)

  - Unspecified cross-site scripting. (CVE-2012-0302)

  - Unspecified cross-site request forgery. (CVE-2012-0303)");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2012/Jul/12");
  # https://support.symantec.com/en_US/article.SYMSA1254.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?db46dd92");
  # http://www.symantec.com/business/support/index?page=content&id=TECH191487
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?df589738");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Symantec Message Filter 6.3 and apply patch smf_630_p231.

This patch is the last security update that will be provided for
Symantec Message Filter as the software is no longer supported. 
Consider migrating to a different product.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/06/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/06/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/07/03");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:message_filter");
  script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2012-2024 Tenable Network Security, Inc.");

  script_dependencies("symantec_message_filter_bcc_detect.nasl");
  script_require_keys("www/smf_bcc");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 41080);

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");
include("audit.inc");

port = get_http_port(default:41080);
install = get_install_from_kb(appname:'smf_bcc', port:port, exit_on_fail:TRUE);

# TECH191487 says you can detect the presence of the patch by requesting
# about.jsp and try.do. requesting about.jsp checks if the info leak has been
# patched. requesting try.do checks if the XSS has been patched (i.e., a custom
# error page is being used). we can check for the presence of the patch in the
# latter by seeing if the default error page is being used
url = install['dir'] + '/about.jsp';
res = http_send_recv3(method:'GET', item:url, port:port, exit_on_fail:TRUE);
match = eregmatch(string:res[2], pattern:"Version ([\d.]+)");
if (isnull(match))
  smf_ver = NULL;
else
  smf_ver = match[1];

url = install['dir'] + '/try.do';
res = http_send_recv3(method:'GET', item:url, port:port, exit_on_fail:TRUE);
match = eregmatch(string:res[2], pattern:"Apache Tomcat/([\d.]+)");
if (isnull(match))
  tomcat_ver = NULL;
else
  tomcat_ver = match[1];

if (isnull(smf_ver) && isnull(tomcat_ver))
  audit(AUDIT_WEB_APP_NOT_AFFECTED, 'Symantec Message Filter', build_url(qs:install['dir'], port:port));

set_kb_item(name:'www/' + port + '/XSRF', value:TRUE);
set_kb_item(name:'www/' + port + '/XSS', value:TRUE);

if (report_verbosity > 0)
{
  report =
    '\nNessus determined the patch is missing per the instructions in' +
    '\nTECH191487.\n';

  if (!isnull(smf_ver))
  {
    report +=
      '\nThe following page does not redirect to the user logon page :\n\n' +
      build_url(qs:install['dir'] + '/about.jsp', port:port) + '\n';
  }
  if (!isnull(tomcat_ver))
  {
    report +=
      '\nThe following page does not display an error with the Symantec logo :\n\n' +
      build_url(qs:install['dir'] + '/try.do', port:port) + '\n';
  }

  security_warning(port:port, extra:report);
}
else security_warning(port);

VendorProductVersionCPE
symantecmessage_filtercpe:/a:symantec:message_filter

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.4 Medium

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

72.0%

Related for SYMANTEC_MESSAGE_FILTER_SYM12-010.NASL