6.5 Medium
AI Score
Confidence
Low
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
52.4%
The remote host is missing a security patch.
# SPDX-FileCopyrightText: 2015 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/h:f5:big-ip";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.105373");
script_cve_id("CVE-2013-1824");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_version("2023-08-09T05:05:14+0000");
script_name("F5 BIG-IP - SOAP parser vulnerability CVE-2013-1824");
script_xref(name:"URL", value:"https://my.f5.com/manage/s/article/K15879");
script_tag(name:"impact", value:"If a PHP application accepts untrusted SOAP object input remotely from clients, an attacker could use this flaw for the unauthorized reading of system files, accessible with the privileges of the PHP application.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. (CVE-2013-1824)");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_tag(name:"summary", value:"The remote host is missing a security patch.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"last_modification", value:"2023-08-09 05:05:14 +0000 (Wed, 09 Aug 2023)");
script_tag(name:"creation_date", value:"2015-09-19 10:39:58 +0200 (Sat, 19 Sep 2015)");
script_category(ACT_GATHER_INFO);
script_family("F5 Local Security Checks");
script_copyright("Copyright (C) 2015 Greenbone AG");
script_dependencies("gb_f5_big_ip_version.nasl");
script_mandatory_keys("f5/big_ip/version", "f5/big_ip/active_modules");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
include("list_array_func.inc");
include("f5.inc");
if (!version = get_app_version(cpe: CPE))
exit(0);
check_f5["LTM"] = make_array("affected", "11.0.0-11.4.1;10.0.0-10.2.4;",
"unaffected", "11.5.0-11.6.0;");
check_f5["AAM"] = make_array("affected", "11.4.0-11.4.1;",
"unaffected", "11.5.0-11.6.0;");
check_f5["AFM"] = make_array("affected", "11.3.0-11.4.1;",
"unaffected", "11.5.0-11.6.0;");
check_f5["AVR"] = make_array("affected", "11.0.0-11.4.1;",
"unaffected", "11.5.0-11.6.0;");
check_f5["APM"] = make_array("affected", "11.0.0-11.4.1;10.1.0-10.2.4;",
"unaffected", "11.5.0-11.6.0;");
check_f5["ASM"] = make_array("affected", "11.0.0-11.4.1;10.0.0-10.2.4;",
"unaffected", "11.5.0-11.6.0;");
check_f5["GTM"] = make_array("affected", "11.0.0-11.4.1;10.0.0-10.2.4;",
"unaffected", "11.5.0-11.6.0;");
check_f5["LC"] = make_array("affected", "11.0.0-11.4.1;10.0.0-10.2.4;",
"unaffected", "11.5.0-11.6.0;");
check_f5["PEM"] = make_array("affected", "11.3.0-11.4.1;",
"unaffected", "11.5.0-11.6.0;");
if (report = f5_is_vulnerable(ca: check_f5, version: version)) {
security_message(port: 0, data: report);
exit(0);
}
exit(99);