Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310114279
HistoryJan 17, 2024 - 12:00 a.m.

Oracle OpenJDK 17.x Vulnerability (Jan 2024)

2024-01-1700:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
6
oracle
openjdk
vulnerability
security-libs
java security
network access
unauthorized access
cve-2024-20932
oracle java se
graalvm

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%

Oracle OpenJDK is prone to a vulnerability in the
security-libs/java.security component.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:oracle:openjdk";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.114279");
  script_version("2024-04-19T05:05:37+0000");
  script_tag(name:"last_modification", value:"2024-04-19 05:05:37 +0000 (Fri, 19 Apr 2024)");
  script_tag(name:"creation_date", value:"2024-01-17 07:49:08 +0000 (Wed, 17 Jan 2024)");
  script_tag(name:"cvss_base", value:"7.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:C/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-01-16 23:12:00 +0000 (Tue, 16 Jan 2024)");

  script_cve_id("CVE-2024-20932");

  script_tag(name:"qod_type", value:"executable_version_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Oracle OpenJDK 17.x Vulnerability (Jan 2024)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_openjdk_detect.nasl");
  script_mandatory_keys("openjdk/detected");

  script_tag(name:"summary", value:"Oracle OpenJDK is prone to a vulnerability in the
  security-libs/java.security component.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Easily exploitable vulnerability allows unauthenticated attacker
  with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK,
  Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in
  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE,
  Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This
  vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start
  applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes
  from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to
  Java deployments, typically in servers, that load and run only trusted code (e.g., code installed
  by an administrator).");

  # nb: Versions 8 and 11 received fixes in/with CVE-2024-20926 at the same time so currently it is
  # assumed that only the 17.x branch was affeacted by this flaw as 8 or 11 would have received
  # fixes as well.
  script_tag(name:"affected", value:"Oracle OpenJDK version 17.x.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_xref(name:"URL", value:"https://openjdk.org/groups/vulnerability/advisories/2024-01-16");
  script_xref(name:"URL", value:"https://mail.openjdk.org/pipermail/vuln-announce/2024-January/000022.html");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range(version: version, test_version: "17.0", test_version2: "17.0.9")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "17.0.10", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.8%