4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
59.3%
Cross-site scripting (XSS) vulnerability in the login page in the Administrative Web Interface on Dell iDRAC6 monolithic devices with firmware before 1.96 and iDRAC7 devices with firmware before 1.46.45 allows remote attackers to inject arbitrary web script or HTML via the ErrorMsg parameter.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(501897);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/18");
script_cve_id("CVE-2013-3589");
script_name(english:"Dell iDRAC6 Cross-site Scripting (CVE-2013-3589)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"Cross-site scripting (XSS) vulnerability in the login page in the
Administrative Web Interface on Dell iDRAC6 monolithic devices with
firmware before 1.96 and iDRAC7 devices with firmware before 1.46.45
allows remote attackers to inject arbitrary web script or HTML via the
ErrorMsg parameter.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
script_set_attribute(attribute:"see_also", value:"http://www.kb.cert.org/vuls/id/920038");
script_set_attribute(attribute:"see_also", value:"http://www.kb.cert.org/vuls/id/BLUU-997QVW");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-3589");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(79);
script_set_attribute(attribute:"vuln_publication_date", value:"2013/09/24");
script_set_attribute(attribute:"patch_publication_date", value:"2013/09/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/01/17");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/h:dell:idrac6_monolithic");
script_set_attribute(attribute:"cpe", value:"cpe:/o:dell:idrac7_firmware");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Dell");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Dell');
var asset = tenable_ot::assets::get(vendor:'Dell');
var vuln_cpes = {
"cpe:/h:dell:idrac6_monolithic" :
{"versionEndIncluding" : "1.95", "family" : "iDRAC6"},
"cpe:/o:dell:idrac7_firmware" :
{"versionEndExcluding" : "1.46.45", "family" : "iDRAC7"},
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
dell | idrac6_monolithic | cpe:/h:dell:idrac6_monolithic | |
dell | idrac7_firmware | cpe:/o:dell:idrac7_firmware |