Lucene search

K
nessusThis script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.WEBSPHERE_PORTAL_CVE-2014-0114.NASL
HistorySep 05, 2014 - 12:00 a.m.

IBM WebSphere Portal Apache Struts ClassLoader Manipulation RCE

2014-09-0500:00:00
This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
151

The version of IBM WebSphere Portal on the remote host is affected by a remote code execution vulnerability in the Apache Struts ClassLoader. A remote attacker can exploit this issue by manipulating the ‘class’ parameter of an ActionForm object to execute arbitrary code.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(77535);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2014-0114");
  script_bugtraq_id(67121);

  script_name(english:"IBM WebSphere Portal Apache Struts ClassLoader Manipulation RCE");
  script_summary(english:"Checks for installed patches.");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has web portal software installed that is
affected by a remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of IBM WebSphere Portal on the remote host is affected by
a remote code execution vulnerability in the Apache Struts
ClassLoader. A remote attacker can exploit this issue by manipulating
the 'class' parameter of an ActionForm object to execute arbitrary
code.");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21680194");
  # https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_classloader_manipulation_with_apache_struts_affecting_ibm_websphere_portal_cve_2014_0114?lang=en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6f272d04");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patches listed in the advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Apache Struts ClassLoader Manipulation Remote Code Execution');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/07/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/05");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_portal");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:struts");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_portal_installed.nbin");
  script_require_keys("installed_sw/IBM WebSphere Portal");
  script_require_ports(139, 445);

  exit(0);
}

include("websphere_portal_version.inc");

portlets = make_array();

paa = "IBM Common PIM";
portlets[paa]["Fixed Version"] = "8.03";
portlets[paa]["File"]          = "\..\wp_profile\paa\mail\components\mail\version\mail.component";
portlets[paa]["Version Regex"] = 'spec-version="([0-9\\.]+)"\\s*/>';
portlets[paa]["WP Ranges"]     = make_list("8.5.0.0, 8.5.0.0", "8.0.0.0, 8.0.0.1");


websphere_portal_check_version(
  checks:make_array(
    "8.5.0.0, 8.5.0.0, CF01", make_list("PI18707"),
    "8.0.0.0, 8.0.0.1, CF12", make_list("PI20686, PI20737, PI20741, PI20861"),
    "8.0.0.0, 8.0.0.1, CF13", make_list("PI20737"),
    "7.0.0.0, 7.0.0.2, CF28", make_list("PI20686, PI20737, PI20861, PI20741, PI21113"),
    "6.1.5.0, 6.1.5.3, CF27", make_list("PI20686, PI20737, PI20861, PI20741, PI21113"),
    "6.1.0.0, 6.1.0.6, CF27", make_list("PI20686, PI20737, PI20861, PI20741, PI21113")
  ),
  severity:SECURITY_HOLE,
  portlets:portlets
);
Related for WEBSPHERE_PORTAL_CVE-2014-0114.NASL