Meeting Room Booking System Multiple Vulnerabilities
2017-11-21T00:00:00
ID OPENVAS:1361412562310107264 Type openvas Reporter Copyright (C) 2017 Greenbone Networks GmbH Modified 2018-10-19T00:00:00
Description
This host is installed with Meeting Room Booking System and is
prone to multiple vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_mrbs_xss_vuln.nasl 11982 2018-10-19 08:49:21Z mmartin $
#
# Meeting Room Booking System Multiple Vulnerabilities
#
# Authors:
# Tameem Eissa <tameem.eissa@greenbone.net>
#
# Copyright:
# Copyright (c) 2017 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
CPE = "cpe:/a:john_beranek:meeting_room_booking_system";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.107264");
script_version("$Revision: 11982 $");
script_tag(name:"last_modification", value:"$Date: 2018-10-19 10:49:21 +0200 (Fri, 19 Oct 2018) $");
script_tag(name:"creation_date", value:"2017-11-21 07:28:01 +0200 (Tue, 21 Nov 2017)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("Meeting Room Booking System Multiple Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone Networks GmbH");
script_family("Web application abuses");
script_dependencies("gb_mrbs_detect.nasl");
script_require_ports("Services/www", 80);
script_mandatory_keys("MRBS/installed");
script_xref(name:"URL", value:"https://www.cert-bund.de/advisoryshort/CB-K17-1995");
script_tag(name:"impact", value:"An attacker may leverage this issue to execute arbitrary script code in the browser
of an unsuspecting user in the context of the affected site. This may let the
attacker steal cookie-based authentication credentials and launch other attacks.");
script_tag(name:"affected", value:"Meeting Room Booking System prior to 1.7.0");
script_tag(name:"solution", value:"Upgrade to Meeting Room Booking System 1.7.0 or later.");
script_tag(name:"summary", value:"This host is installed with Meeting Room Booking System and is
prone to multiple vulnerabilities.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_xref(name:"URL", value:"http://mrbs.sourceforge.net/download.php");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );
if( version_is_less( version:vers, test_version:"1.7.0" ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"1.7.0" );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );
{"id": "OPENVAS:1361412562310107264", "type": "openvas", "bulletinFamily": "scanner", "title": "Meeting Room Booking System Multiple Vulnerabilities", "description": "This host is installed with Meeting Room Booking System and is\n prone to multiple vulnerabilities.", "published": "2017-11-21T00:00:00", "modified": "2018-10-19T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310107264", "reporter": "Copyright (C) 2017 Greenbone Networks GmbH", "references": ["https://www.cert-bund.de/advisoryshort/CB-K17-1995", "http://mrbs.sourceforge.net/download.php"], "cvelist": [], "lastseen": "2018-10-22T16:34:35", "viewCount": 1, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2018-10-22T16:34:35", "rev": 2}, "dependencies": {"references": [], "modified": "2018-10-22T16:34:35", "rev": 2}, "vulnersScore": 0.1}, "pluginID": "1361412562310107264", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_mrbs_xss_vuln.nasl 11982 2018-10-19 08:49:21Z mmartin $\n#\n# Meeting Room Booking System Multiple Vulnerabilities\n#\n# Authors:\n# Tameem Eissa <tameem.eissa@greenbone.net>\n#\n# Copyright:\n# Copyright (c) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:john_beranek:meeting_room_booking_system\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.107264\");\n script_version(\"$Revision: 11982 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-19 10:49:21 +0200 (Fri, 19 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-11-21 07:28:01 +0200 (Tue, 21 Nov 2017)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Meeting Room Booking System Multiple Vulnerabilities\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_mrbs_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"MRBS/installed\");\n\n script_xref(name:\"URL\", value:\"https://www.cert-bund.de/advisoryshort/CB-K17-1995\");\n\n script_tag(name:\"impact\", value:\"An attacker may leverage this issue to execute arbitrary script code in the browser\n of an unsuspecting user in the context of the affected site. This may let the\n attacker steal cookie-based authentication credentials and launch other attacks.\");\n script_tag(name:\"affected\", value:\"Meeting Room Booking System prior to 1.7.0\");\n script_tag(name:\"solution\", value:\"Upgrade to Meeting Room Booking System 1.7.0 or later.\");\n script_tag(name:\"summary\", value:\"This host is installed with Meeting Room Booking System and is\n prone to multiple vulnerabilities.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n\n script_xref(name:\"URL\", value:\"http://mrbs.sourceforge.net/download.php\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) ) exit( 0 );\nif( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"1.7.0\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"1.7.0\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n", "naslFamily": "Web application abuses"}