Lucene search

K
nessusThis script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.TRENDMICRO_OFFICESCAN_000287815.NASL
HistoryNov 08, 2021 - 12:00 a.m.

Trend Micro OfficeScan 10 SP1 < 10 SP1 Patch 2329 Multiple Vulnerabilities (000287815)

2021-11-0800:00:00
This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6

According to its self-reported version, the Trend Micro OfficeScan application running on the remote host is prior to 10 SP1 Patch 2329. It is, therefore, affected by multiple vulnerabilities:

  • An improper input validation vulnerability has been identified in business security. This may allow you to upload arbitrary files remotely. An attacker would need to be able to log in to the product management console to exploit this vulnerability. (CVE-2021-36741)

  • An improper input validation vulnerability has been identified in business security. This can lead to local privilege escalation. Exploitation of this vulnerability requires low-privileged code execution on the target system. (CVE-2021-36742)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(154962);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/04/25");

  script_cve_id("CVE-2021-36741", "CVE-2021-36742");
  script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2021/11/17");

  script_name(english:"Trend Micro OfficeScan 10 SP1 < 10 SP1 Patch 2329 Multiple Vulnerabilities (000287815)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is running an application that is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Trend Micro OfficeScan application running on the remote host is prior to 
10 SP1 Patch 2329. It is, therefore, affected by multiple vulnerabilities:

 - An improper input validation vulnerability has been identified in business security. This may allow you to upload 
    arbitrary files remotely. An attacker would need to be able to log in to the product management console to exploit 
    this vulnerability. (CVE-2021-36741)

 - An improper input validation vulnerability has been identified in business security. This can lead to local 
    privilege escalation. Exploitation of this vulnerability requires low-privileged code execution on the target 
    system. (CVE-2021-36742)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://success.trendmicro.com/jp/solution/000287815");
  script_set_attribute(attribute:"solution", value:
"Upgrade to OfficeScan 10 SP1 Patch 2329 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2021-36741");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2021/07/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2021/07/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/11/08");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:trend_micro:officescan");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("trendmicro_officescan_detect.nbin");
  script_require_keys("installed_sw/Trend Micro OfficeScan");
  script_require_ports("Services/www", 4343, 8080);

  exit(0);
}

include('http_func.inc');
include('vcf.inc');

var app = 'Trend Micro OfficeScan';
var port = get_http_port(default:4343);
get_install_count(app_name:app, exit_if_zero:TRUE);

var app_info = vcf::get_app_info(app:app, port:port, webapp:TRUE);
vcf::check_granularity(app_info:app_info, sig_segments:4);
if ('Service Pack 1' >!< app_info['Source']) audit(AUDIT_HOST_NOT, 'affected');

var constraints = [{'fixed_version' : '10.0.0.2329', 'fixed_display' : '10 SP1 Patch 2329'}];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
trend_microofficescancpe:/a:trend_micro:officescan
Related for TRENDMICRO_OFFICESCAN_000287815.NASL