Lucene search

K
nessusThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.WEBSPHERE_CVE-2019-4505.NASL
HistoryJan 30, 2020 - 12:00 a.m.

IBM WebSphere Application Server Virtual Enterprise 7.0.x <= 7.0.0.6 / Virtual Enterprise 8.0.x / 8.5.5.x < 8.5.5.17 / 9.0.x < 9.0.5.1 Information Disclosure (CVE-2019-4505)

2020-01-3000:00:00
This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
21

The IBM WebSphere Application Server running on the remote host is version 7.0.x prior or equal to 7.0.0.6, 8.0.x, 8.5.0.x prior to 8.5.5.17, or 9.0.x prior to 9.0.5.1. It is, therefore, affected by an information disclosure vulnerability. An unauthenticated remote attacker can exploit this by using a specially crafted URL to obtain any file in a certain directory.

#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(133360);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/11/30");

  script_cve_id("CVE-2019-4505");

  script_name(english:"IBM WebSphere Application Server Virtual Enterprise 7.0.x <= 7.0.0.6 / Virtual Enterprise 8.0.x / 8.5.5.x < 8.5.5.17 / 9.0.x < 9.0.5.1 Information Disclosure (CVE-2019-4505)");
  script_summary(english:"Reads the version number from the SOAP and GIOP services.");

  script_set_attribute(attribute:"synopsis", value:
"The remote web application server is affected by an information disclosure vulnerability");
  script_set_attribute(attribute:"description", value:
"The IBM WebSphere Application Server running on the remote host is
version 7.0.x prior or equal to 7.0.0.6, 8.0.x, 8.5.0.x prior to
8.5.5.17, or 9.0.x prior to 9.0.5.1. It is, therefore, affected by
an information disclosure vulnerability. An unauthenticated remote
attacker can exploit this by using a specially crafted URL to obtain
any file in a certain directory.");
  script_set_attribute(attribute:"see_also", value:"https://exchange.xforce.ibmcloud.com/vulnerabilities/164364");
  script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/pages/node/964766");
  script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/pages/node/1073902");
  script_set_attribute(attribute:"solution", value:
"Upgrade to IBM WebSphere Application Server 8.5.5.17, 9.0.5.1, or
later.  Alternatively, upgrade to the minimal fix pack levels required
by the interim  fix and then apply Interim Fix PH14796.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-4505");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/09/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/30");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_detect.nasl", "ibm_enum_products.nbin", "ibm_websphere_application_server_nix_installed.nbin");
  script_require_keys("installed_sw/IBM WebSphere Application Server");

  exit(0);
}

include('vcf.inc');


app = 'IBM WebSphere Application Server';
fix = 'Interim Fix PH14796';

get_install_count(app_name:app, exit_if_zero:TRUE);
app_info = vcf::combined_get_app_info(app:app);
vcf::check_granularity(app_info:app_info, sig_segments:4);

# If the detection is only remote, Source will be set, and we should require paranoia
if (!empty_or_null(app_info['Source']) && app_info['Source'] != 'unknown' && report_paranoia < 2)
  audit(AUDIT_PARANOID);

if ('PH14796' >< app_info['Fixes'])
  audit(AUDIT_INST_VER_NOT_VULN, app);

constraints = [
  # Interim fix notes 7.0.0.6 as 'applies to' and 'upgrades to', so
  # capping check at 7.0.0.6 based on that. No fixed releases are noted.
  {'min_version':'7.0.0.0', 'max_version':'7.0.0.6', 'fixed_version':fix},
  # Advisory and other pages only note that 8.0..x is vuln with no
  # further guidance. Marking all 8.0.x vuln based on that. No
  # fixed releases are noted, thus noting same fix as 8.5.5.x fix.
  {'min_version':'8.0.0.0', 'max_version':'8.0.9999.9999', 'fixed_version':'8.5.5.17 or 8.5.5.x with ' + fix},
  {'min_version':'8.5.5.0', 'max_version':'8.5.5.16', 'fixed_version':'8.5.5.17 or ' + fix},
  {'min_version':'9.0.0.0', 'max_version':'9.0.5.0', 'fixed_version':'9.0.5.1 or ' + fix}
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
ibmwebsphere_application_servercpe:/a:ibm:websphere_application_server
Related for WEBSPHERE_CVE-2019-4505.NASL