The version of IBM WebSphere Portal on the remote host is affected by a remote code execution vulnerability in the Apache Struts ClassLoader. A remote attacker can exploit this issue by manipulating the ‘class’ parameter of an ActionForm object to execute arbitrary code.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(77535);
script_version("1.10");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2014-0114");
script_bugtraq_id(67121);
script_name(english:"IBM WebSphere Portal Apache Struts ClassLoader Manipulation RCE");
script_summary(english:"Checks for installed patches.");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has web portal software installed that is
affected by a remote code execution vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of IBM WebSphere Portal on the remote host is affected by
a remote code execution vulnerability in the Apache Struts
ClassLoader. A remote attacker can exploit this issue by manipulating
the 'class' parameter of an ActionForm object to execute arbitrary
code.");
script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21680194");
# https://www-304.ibm.com/connections/blogs/PSIRT/entry/ibm_security_bulletin_classloader_manipulation_with_apache_struts_affecting_ibm_websphere_portal_cve_2014_0114?lang=en_us
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6f272d04");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patches listed in the advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Apache Struts ClassLoader Manipulation Remote Code Execution');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/04/29");
script_set_attribute(attribute:"patch_publication_date", value:"2014/07/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_portal");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:struts");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("websphere_portal_installed.nbin");
script_require_keys("installed_sw/IBM WebSphere Portal");
script_require_ports(139, 445);
exit(0);
}
include("websphere_portal_version.inc");
portlets = make_array();
paa = "IBM Common PIM";
portlets[paa]["Fixed Version"] = "8.03";
portlets[paa]["File"] = "\..\wp_profile\paa\mail\components\mail\version\mail.component";
portlets[paa]["Version Regex"] = 'spec-version="([0-9\\.]+)"\\s*/>';
portlets[paa]["WP Ranges"] = make_list("8.5.0.0, 8.5.0.0", "8.0.0.0, 8.0.0.1");
websphere_portal_check_version(
checks:make_array(
"8.5.0.0, 8.5.0.0, CF01", make_list("PI18707"),
"8.0.0.0, 8.0.0.1, CF12", make_list("PI20686, PI20737, PI20741, PI20861"),
"8.0.0.0, 8.0.0.1, CF13", make_list("PI20737"),
"7.0.0.0, 7.0.0.2, CF28", make_list("PI20686, PI20737, PI20861, PI20741, PI21113"),
"6.1.5.0, 6.1.5.3, CF27", make_list("PI20686, PI20737, PI20861, PI20741, PI21113"),
"6.1.0.0, 6.1.0.6, CF27", make_list("PI20686, PI20737, PI20861, PI20741, PI21113")
),
severity:SECURITY_HOLE,
portlets:portlets
);
Vendor | Product | Version |
---|---|---|
ibm | websphere_portal | |
apache | struts |