Lucene search

K
openvasCopyright (C) 2015 Greenbone AGOPENVAS:1361412562310105373
HistorySep 19, 2015 - 12:00 a.m.

F5 BIG-IP - SOAP parser vulnerability CVE-2013-1824

2015-09-1900:00:00
Copyright (C) 2015 Greenbone AG
plugins.openvas.org
15

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.4%

The remote host is missing a security patch.

# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/h:f5:big-ip";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105373");
  script_cve_id("CVE-2013-1824");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_version("2023-08-09T05:05:14+0000");

  script_name("F5 BIG-IP - SOAP parser vulnerability CVE-2013-1824");

  script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K15879");

  script_tag(name:"impact", value:"If a PHP application accepts untrusted SOAP object input remotely from clients, an attacker could use this flaw for the unauthorized reading of system files, accessible with the privileges of the PHP application.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. (CVE-2013-1824)");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_tag(name:"summary", value:"The remote host is missing a security patch.");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"last_modification", value:"2023-08-09 05:05:14 +0000 (Wed, 09 Aug 2023)");
  script_tag(name:"creation_date", value:"2015-09-19 10:39:58 +0200 (Sat, 19 Sep 2015)");
  script_category(ACT_GATHER_INFO);
  script_family("F5 Local Security Checks");
  script_copyright("Copyright (C) 2015 Greenbone AG");
  script_dependencies("gb_f5_big_ip_version.nasl");
  script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
  exit(0);
}

include("version_func.inc");
include("host_details.inc");
include("list_array_func.inc");
include("f5.inc");

if (!version = get_app_version(cpe: CPE))
  exit(0);

check_f5["LTM"] = make_array("affected",   "11.0.0-11.4.1;10.0.0-10.2.4;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["AAM"] = make_array("affected",   "11.4.0-11.4.1;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["AFM"] = make_array("affected",   "11.3.0-11.4.1;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["AVR"] = make_array("affected",   "11.0.0-11.4.1;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["APM"] = make_array("affected",   "11.0.0-11.4.1;10.1.0-10.2.4;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["ASM"] = make_array("affected",   "11.0.0-11.4.1;10.0.0-10.2.4;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["GTM"] = make_array("affected",   "11.0.0-11.4.1;10.0.0-10.2.4;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["LC"]  = make_array("affected",   "11.0.0-11.4.1;10.0.0-10.2.4;",
                             "unaffected", "11.5.0-11.6.0;");

check_f5["PEM"] = make_array("affected",   "11.3.0-11.4.1;",
                             "unaffected", "11.5.0-11.6.0;");

if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

6.5 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

52.4%