Lucene search

K
nessusThis script is Copyright (C) 2008-2022 Tenable Network Security, Inc.XEROX_XRX08_008.NASL
HistoryJul 11, 2008 - 12:00 a.m.

Xerox CentreWare Web < 4.6.46 Multiple Vulnerabilities (XRX08-008)

2008-07-1100:00:00
This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.
www.tenable.com
26

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

60.3%

Xerox CentreWare Web, a web-based tool for IP printer management, is installed on the remote web server.

According to its banner, the installed version of Xerox CentreWare Web reportedly contains three areas that are prone to SQL injection attacks, provided the attacker has valid credentials, and two areas that are prone to cross-site scripting attacks.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(33478);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2008-3121", "CVE-2008-3122");
  script_bugtraq_id(30151);
  script_xref(name:"SECUNIA", value:"30978");

  script_name(english:"Xerox CentreWare Web < 4.6.46 Multiple Vulnerabilities (XRX08-008)");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains an application that is affected by
multiple issues.");
  script_set_attribute(attribute:"description", value:
"Xerox CentreWare Web, a web-based tool for IP printer management, is
installed on the remote web server.

According to its banner, the installed version of Xerox CentreWare Web
reportedly contains three areas that are prone to SQL injection attacks,
provided the attacker has valid credentials, and two areas that are
prone to cross-site scripting attacks.");
  script_set_attribute(attribute:"see_also", value:"https://www.xerox.com/downloads/usa/en/c/cert_XRX08_008.pdf");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Xerox CentreWare Web version 4.6.46 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(79, 89);

  script_set_attribute(attribute:"vuln_publication_date", value:"2008/07/09");
  script_set_attribute(attribute:"patch_publication_date", value:"2008/07/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/07/11");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:xerox:centreware_web");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:80, embedded: 0);

# Loop through directories.
if (thorough_tests) dirs = list_uniq(make_list("/XeroxCentreWareWeb", cgi_dirs()));
else dirs = make_list(cgi_dirs());

foreach dir (dirs)
{
  # Grab the initial page.
  url = string(dir, "/");
  res = http_send_recv3(
    method : "GET",
    item   : url,
    port   : port,
    exit_on_fail : TRUE
  );

  # If it looks like CentreWare Web...
  if (">Xerox CentreWare Web <" >< res[2])
  {
    # Extract the version number from the footer.
    version = UNKNOWN_VER;

    pat = "GFooter.+>Version: [0-9][0-9.]+ \(Build: ([0-9][0-9.]+)\)";
    matches = egrep(pattern:pat, string:res[2]);
    if (matches)
    {
      foreach match (split(matches))
      {
        match = chomp(match);
        item = eregmatch(pattern:pat, string:match);
        if (!isnull(item))
        {
          version = item[1];
          break;
        }
      }
    }

    # Check the version number.
    if (version != UNKNOWN_VER)
    {
      ver = split(version, sep:'.', keep:FALSE);
      for (i=0; i<max_index(ver); i++)
        ver[i] = int(ver[i]);

      fix = split("4.6.47", sep:'.', keep:FALSE);
      for (i=0; i<max_index(fix); i++)
        fix[i] = int(fix[i]);

      for (i=0; i<max_index(ver); i++)
        if ((ver[i] < fix[i]))
        {
          set_kb_item(name: 'www/'+port+'/XSS', value: TRUE);
          set_kb_item(name: 'www/'+port+'/SQLInjection', value: TRUE);
          if (report_verbosity > 0)
          {
            report =
              '\n' +
              'Xerox CentreWare Web version ' +version+ ' is installed on the'+
              ' remote\n' +
              'web server under the following URL :\n' +
              '\n' +
              '  ' + build_url(port:port, qs:url) + '\n';
            security_warning(port:port, extra:report);
          }
          else security_warning(port:port);
          exit(0);
        }
        else if (ver[i] > fix[i])
          break;
    }
  }
}
audit(AUDIT_WEB_APP_NOT_AFFECTED, "Xerox CentreWare Web", build_url(port:port, qs:url));
VendorProductVersionCPE
xeroxcentreware_webcpe:/a:xerox:centreware_web

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

60.3%

Related for XEROX_XRX08_008.NASL