Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.WEBSPHERE_PORTAL_CVE-2013-5454.NASL
HistoryMar 26, 2014 - 12:00 a.m.

IBM WebSphere Portal Unspecified URL Manipulation Arbitrary File Access (PM99205)

2014-03-2600:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.1%

The version of WebSphere Portal on the remote host is affected by a file access vulnerability. An attacker could manipulate URLs and gain access to arbitrary files.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(73208);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2013-5454");
  script_bugtraq_id(63643);

  script_name(english:"IBM WebSphere Portal Unspecified URL Manipulation Arbitrary File Access (PM99205)");
  script_summary(english:"Checks for installed patches.");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has web portal software installed that is
affected by an arbitrary file access vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of WebSphere Portal on the remote host is affected by a
file access vulnerability. An attacker could manipulate URLs and gain
access to arbitrary files.");
  # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_websphere_portal_vulnerable_to_url_manipulation_cve_2013_5454_pm99205?lang=en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0aabfe6a");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21655656");
  script_set_attribute(attribute:"solution", value:
"IBM has published Interim Fix PM99205. Refer to IBM's advisory for
more information.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-5454");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/11/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/11/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/26");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_portal");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_portal_installed.nbin");
  script_require_keys("installed_sw/IBM WebSphere Portal");

  exit(0);
}

include("websphere_portal_version.inc");

websphere_portal_check_version(
  ranges:make_list(
    "6.0.1.0, 6.0.1.7",
    "6.1.0.0, 6.1.0.6, CF27",
    "6.1.5.0, 6.1.5.3, CF27",
    "7.0.0.0, 7.0.0.2, CF25",
    "8.0.0.0, 8.0.0.1, CF08"
  ),
  fix:"PM99205",
  severity:SECURITY_WARNING
);
VendorProductVersionCPE
ibmwebsphere_portalcpe:/a:ibm:websphere_portal

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.1%

Related for WEBSPHERE_PORTAL_CVE-2013-5454.NASL