Mesosphere Marathon Web UI Public WAN (Internet) Accessible
2018-07-20T00:00:00
ID OPENVAS:1361412562310114012 Type openvas Reporter Copyright (C) 2018 Greenbone Networks GmbH Modified 2020-05-08T00:00:00
Description
The script checks if the Mesosphere Marathon Web UI is exposed to the public
at the remote web server.
###############################################################################
# OpenVAS Vulnerability Test
#
# Mesosphere Marathon Web UI Public WAN (Internet) Accessible
#
# Authors:
# Thorsten Passfeld <thorsten.passfeld@greenbone.net>
#
# Copyright:
# Copyright (C) 2018 Greenbone Networks GmbH
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.114012");
script_version("2020-05-08T08:34:44+0000");
script_tag(name:"last_modification", value:"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)");
script_tag(name:"creation_date", value:"2018-07-20 11:40:39 +0200 (Fri, 20 Jul 2018)");
script_tag(name:"cvss_base", value:"9.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:P/A:P");
script_name("Mesosphere Marathon Web UI Public WAN (Internet) Accessible");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
script_family("Web application abuses");
script_dependencies("global_settings.nasl", "gb_mesosphere_marathon_detect.nasl");
script_mandatory_keys("mesosphere/marathon/detected", "keys/is_public_addr");
script_xref(name:"URL", value:"https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021%2C000%20Cloud%20Environments.pdf");
script_tag(name:"summary", value:"The script checks if the Mesosphere Marathon Web UI is exposed to the public
at the remote web server.");
script_tag(name:"insight", value:"The installation or configuration of Mesosphere Marathon might be incomplete and therefore
it is unprotected and exposed to the public.");
script_tag(name:"vuldetect", value:"Check if the Mesosphere Marathon UI is accessible.");
script_tag(name:"impact", value:"Access to the dashboard gives you top level
access to all aspects of administration for the cluster it is assigned to manage.
That includes managing applications, containers, starting workloads, adding and
modifying applications, and setting key security controls.");
script_tag(name:"solution", value:"It is highly recommended to consider the following:
- Regardless of network policy, use MFA for all access.
- Apply strict controls to network access, especially for UI and API ports.
- Use SSL for all servers and use valid certificates with proper expiration and enforcement policies.
- Investigate VPN (bastion), reverse proxy or direct connect connections to sensitive servers.
- Look into product and services such as Lacework in order to discover, detect, prevent, and secure your container services.");
script_tag(name:"solution_type", value:"Mitigation");
script_tag(name:"qod_type", value:"remote_banner");
exit(0);
}
include("http_func.inc");
include("network_func.inc");
include("host_details.inc");
if(!is_public_addr())
exit(0);
CPE = "cpe:/a:mesosphere:marathon";
if(!port = get_app_port(cpe: CPE))
exit(0);
if(get_kb_item("mesosphere/marathon/" + port + "/detected")) {
report = "Mesosphere Marathon UI is exposed to the public under the following URL: " + http_report_vuln_url(port: port, url: "/", url_only: TRUE);
get_app_location(cpe: CPE, port: port, nofork: TRUE);
security_message(port: port, data: report);
exit(0);
}
exit(99);
{"id": "OPENVAS:1361412562310114012", "type": "openvas", "bulletinFamily": "scanner", "title": "Mesosphere Marathon Web UI Public WAN (Internet) Accessible", "description": "The script checks if the Mesosphere Marathon Web UI is exposed to the public\n at the remote web server.", "published": "2018-07-20T00:00:00", "modified": "2020-05-08T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310114012", "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "references": ["https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021%2C000%20Cloud%20Environments.pdf"], "cvelist": [], "lastseen": "2020-05-12T16:55:39", "viewCount": 3, "enchantments": {"dependencies": {"references": [], "modified": "2020-05-12T16:55:39", "rev": 2}, "score": {"value": -0.1, "vector": "NONE", "modified": "2020-05-12T16:55:39", "rev": 2}, "vulnersScore": -0.1}, "pluginID": "1361412562310114012", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mesosphere Marathon Web UI Public WAN (Internet) Accessible\n#\n# Authors:\n# Thorsten Passfeld <thorsten.passfeld@greenbone.net>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.114012\");\n script_version(\"2020-05-08T08:34:44+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-08 08:34:44 +0000 (Fri, 08 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-07-20 11:40:39 +0200 (Fri, 20 Jul 2018)\");\n script_tag(name:\"cvss_base\", value:\"9.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:P/A:P\");\n script_name(\"Mesosphere Marathon Web UI Public WAN (Internet) Accessible\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"global_settings.nasl\", \"gb_mesosphere_marathon_detect.nasl\");\n script_mandatory_keys(\"mesosphere/marathon/detected\", \"keys/is_public_addr\");\n\n script_xref(name:\"URL\", value:\"https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021%2C000%20Cloud%20Environments.pdf\");\n\n script_tag(name:\"summary\", value:\"The script checks if the Mesosphere Marathon Web UI is exposed to the public\n at the remote web server.\");\n\n script_tag(name:\"insight\", value:\"The installation or configuration of Mesosphere Marathon might be incomplete and therefore\n it is unprotected and exposed to the public.\");\n\n script_tag(name:\"vuldetect\", value:\"Check if the Mesosphere Marathon UI is accessible.\");\n\n script_tag(name:\"impact\", value:\"Access to the dashboard gives you top level\n access to all aspects of administration for the cluster it is assigned to manage.\n That includes managing applications, containers, starting workloads, adding and\n modifying applications, and setting key security controls.\");\n\n script_tag(name:\"solution\", value:\"It is highly recommended to consider the following:\n\n - Regardless of network policy, use MFA for all access.\n\n - Apply strict controls to network access, especially for UI and API ports.\n\n - Use SSL for all servers and use valid certificates with proper expiration and enforcement policies.\n\n - Investigate VPN (bastion), reverse proxy or direct connect connections to sensitive servers.\n\n - Look into product and services such as Lacework in order to discover, detect, prevent, and secure your container services.\");\n\n script_tag(name:\"solution_type\", value:\"Mitigation\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"http_func.inc\");\ninclude(\"network_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!is_public_addr())\n exit(0);\n\nCPE = \"cpe:/a:mesosphere:marathon\";\n\nif(!port = get_app_port(cpe: CPE))\n exit(0);\n\nif(get_kb_item(\"mesosphere/marathon/\" + port + \"/detected\")) {\n report = \"Mesosphere Marathon UI is exposed to the public under the following URL: \" + http_report_vuln_url(port: port, url: \"/\", url_only: TRUE);\n get_app_location(cpe: CPE, port: port, nofork: TRUE);\n security_message(port: port, data: report);\n exit(0);\n}\n\nexit(99);\n", "naslFamily": "Web application abuses"}