Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310103202
HistoryAug 17, 2011 - 12:00 a.m.

Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability

2011-08-1700:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
50

4.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.4%

Apache Commons Daemon is prone to a remote information-disclosure
vulnerability that affects the

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:apache:tomcat";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.103202");
  script_version("2023-07-28T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-07-28 05:05:23 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"creation_date", value:"2011-08-17 15:40:19 +0200 (Wed, 17 Aug 2011)");
  script_cve_id("CVE-2011-2729");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_name("Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability");
  script_category(ACT_GATHER_INFO);
  script_family("Web Servers");
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_dependencies("gb_apache_tomcat_consolidation.nasl", "os_detection.nasl");
  script_mandatory_keys("apache/tomcat/detected", "Host/runs_unixoide"); #  This issue affects applications running on Linux operating systems only.

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/49143");
  script_xref(name:"URL", value:"http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%[email protected]%3E");
  script_xref(name:"URL", value:"http://commons.apache.org/daemon/");
  script_xref(name:"URL", value:"http://tomcat.apache.org/security-5.html");
  script_xref(name:"URL", value:"http://tomcat.apache.org/security-6.html");
  script_xref(name:"URL", value:"http://tomcat.apache.org/security-7.html");

  script_xref(name:"URL", value:"http://commons.apache.org/daemon/jsvc.html");

  script_tag(name:"impact", value:"Remote attackers can exploit this issue to gain access to files and
  directories owned by the superuser, through applications using the
  affected library. This allows attackers to obtain sensitive
  information that may aid in further attacks.");

  script_tag(name:"affected", value:"Versions prior to Commons Daemon 1.0.7 are vulnerable.

  The following Apache Tomcat versions which use the affected library
  are vulnerable:

  Tomcat 7.0.0 through 7.0.19, Tomcat 6.0.30 through 6.0.32, Tomcat 5.5.32
  through 5.5.33

  Note: This issue affects applications running on Linux operating systems only.");

  script_tag(name:"solution", value:"Updates are available. Please see the references for more information.");

  script_tag(name:"summary", value:"Apache Commons Daemon is prone to a remote information-disclosure
  vulnerability that affects the 'jsvc' library.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( isnull( port = get_app_port( cpe:CPE ) ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

vers = infos["version"];
path = infos["location"];

if( version_in_range( version:vers, test_version:"7.0.0", test_version2:"7.0.19" ) ||
    version_in_range( version:vers, test_version:"6.0.30", test_version2:"6.0.32" ) ||
    version_in_range( version:vers, test_version:"5.5.32", test_version2:"5.5.33" ) ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:"5.5.34/6.0.33/7.0.20", install_path:path );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

4.2 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.4%