Lucene search

K
nessusThis script is Copyright (C) 2017-2018 Tenable Network Security, Inc.WEBSPHERE_MQ_8003.NASL
HistoryMay 01, 2017 - 12:00 a.m.

IBM MQ 8.x < 8.0.0.3 Multiple Information Disclosure (credentialed check)

2017-05-0100:00:00
This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.
www.tenable.com
19

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

46.6%

The version of IBM MQ (formerly IBM WebSphere MQ) 8.x installed on the remote Windows host is missing fix pack 8.0.0.3 or later. It is, therefore, affected by the following vulnerabilities :

  • A flaw exists in the Advanced Message Security policy when a JMS client application sends a message to the queue using this policy. Under certain circumstances, a cleartext duplicate copy of the message could be created outside the protected payload. An authenticated, remote attacker can exploit this, using man-in-the-middle techniques, to disclose sensitive information. (CVE-2015-1957)

  • A flaw exists in the MQ Explorer implementation in authentication credential handling due to the server transmitting authentication credentials in cleartext even if the server has been configured to protect passwords. An unauthenticated, remote attacker can can exploit this, using man-in-the-middle techniques, to disclose authentication credentials.
    (CVE-2015-1967)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(99906);
  script_version("1.3");
  script_cvs_date("Date: 2018/08/06 14:03:16");

  script_cve_id(
    "CVE-2015-1957",
    "CVE-2015-1967"
  );
  script_bugtraq_id(75540);
  script_name(english:"IBM MQ 8.x < 8.0.0.3 Multiple Information Disclosure (credentialed check)");
  script_summary(english:"Checks the version of IBM MQ.");

  script_set_attribute(attribute:"synopsis", value:
"A message queuing application installed on the remote Windows host is
affected by multiple information disclosure vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of IBM MQ (formerly IBM WebSphere MQ) 8.x installed on
the remote Windows host is missing fix pack 8.0.0.3 or later. It is,
therefore, affected by the following vulnerabilities :

  - A flaw exists in the Advanced Message Security policy
    when a JMS client application sends a message to the
    queue using this policy. Under certain circumstances,
    a cleartext duplicate copy of the message could be
    created outside the protected payload. An
    authenticated, remote attacker can exploit this, using
    man-in-the-middle techniques, to disclose sensitive
    information. (CVE-2015-1957)

  - A flaw exists in the MQ Explorer implementation in
    authentication credential handling due to the server
    transmitting authentication credentials in cleartext
    even if the server has been configured to protect
    passwords. An unauthenticated, remote attacker can
    can exploit this, using man-in-the-middle techniques,
    to disclose authentication credentials.
    (CVE-2015-1967)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21960506");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21960491");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg27043086#8003");
  script_set_attribute(attribute:"solution", value:
"Apply fix pack 8.0.0.3 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/06/17");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/06/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/05/01");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_mq");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.");

  script_dependencies("websphere_mq_installed.nasl");
  script_require_keys("installed_sw/IBM WebSphere MQ", "SMB/Registry/Enumerated");

  exit(0);
}

include("vcf.inc");
include("vcf_extras.inc");

get_kb_item_or_exit("SMB/Registry/Enumerated");

app_info = vcf::get_app_info(app:"IBM WebSphere MQ", win_local:TRUE);
vcf::check_granularity(app_info:app_info, sig_segments:4);

vcf::ibm::verify_websphere_mq_component(app_info:app_info, required_flavor:'server', required_component:'explorer');

constraints = [
  { "min_version" : "8", "max_version" : "8.0.0.2", "fixed_version" : "8.0.0.3" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
ibmwebsphere_mqcpe:/a:ibm:websphere_mq

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

46.6%

Related for WEBSPHERE_MQ_8003.NASL