Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310104690
HistoryApr 19, 2023 - 12:00 a.m.

Oracle OpenJDK Vulnerability (CVE-2023-21954)

2023-04-1900:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
1
oracle openjdk
vulnerability
hotspot/gc
unauthenticated attacker
network access
oracle java se
oracle graalvm enterprise edition
unauthorized access
critical data
java deployments
untrusted code
oracle openjdk versions 8
11
17
eol versions
vendor advisory.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%

Oracle OpenJDK is prone to a vulnerability in the hotspot/gc
component.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:oracle:openjdk";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.104690");
  script_version("2023-10-20T05:06:03+0000");
  script_tag(name:"last_modification", value:"2023-10-20 05:06:03 +0000 (Fri, 20 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-04-19 07:23:18 +0000 (Wed, 19 Apr 2023)");
  script_tag(name:"cvss_base", value:"5.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:C/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-04-18 20:37:00 +0000 (Tue, 18 Apr 2023)");

  script_cve_id("CVE-2023-21954");

  script_tag(name:"qod_type", value:"executable_version_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Oracle OpenJDK Vulnerability (CVE-2023-21954)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_openjdk_detect.nasl");
  script_mandatory_keys("openjdk/detected");

  script_tag(name:"summary", value:"Oracle OpenJDK is prone to a vulnerability in the hotspot/gc
  component.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Difficult to exploit vulnerability allows unauthenticated
  attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM
  Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to
  critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition
  accessible data.

  Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java
  Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code
  that comes from the internet) and rely on the Java sandbox for security. This vulnerability can
  also be exploited by using APIs in the specified Component, e.g., through a web service which
  supplies data to the APIs.");

  script_tag(name:"affected", value:"Oracle OpenJDK versions 8, 11 and 17.

  Note: The vendor is only evaluating the affected status of supported versions but EOL versions
  like 9 or 13 in between the affected versions are also assumed to be affected.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_xref(name:"URL", value:"https://openjdk.org/groups/vulnerability/advisories/2023-04-18");
  script_xref(name:"URL", value:"https://mail.openjdk.org/pipermail/vuln-announce/2023-April/000019.html");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range(version: version, test_version: "1.8.0", test_version2: "1.8.0.362")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.8.0.372 (8u372)", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "9.0", test_version2: "11.0.18")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "11.0.19", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "12.0", test_version2: "17.0.6")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "17.0.7", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.8%