Lucene search

K

ILIAS < 7.23, 8.x < 8.3 Multiple Vulnerabilities

🗓️ 13 Nov 2023 00:00:00Reported by Copyright (C) 2023 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 10 Views

ILIAS < 7.23, 8.x < 8.3 Multiple Vulnerabilities. Remote code execution, XSS, and workflow engine deletion vulnerabilities identified

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
cvelist
CVE-2023-36485
25 Dec 202300:00
cvelist
cvelist
CVE-2023-36486
25 Dec 202300:00
cvelist
cvelist
CVE-2023-36484
29 Jun 202300:00
cvelist
prion
Design/Logic Flaw
25 Dec 202308:15
prion
prion
Design/Logic Flaw
25 Dec 202308:15
prion
prion
Cross site scripting
29 Jun 202319:15
prion
vulnrichment
CVE-2023-36486
25 Dec 202300:00
vulnrichment
vulnrichment
CVE-2023-36484
29 Jun 202300:00
vulnrichment
osv
CVE-2023-36485
25 Dec 202308:15
osv
osv
CVE-2023-36486
25 Dec 202308:15
osv
Rows per page
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:ilias:ilias";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.170688");
  script_version("2024-02-14T05:07:39+0000");
  script_tag(name:"last_modification", value:"2024-02-14 05:07:39 +0000 (Wed, 14 Feb 2024)");
  script_tag(name:"creation_date", value:"2023-11-13 12:32:02 +0000 (Mon, 13 Nov 2023)");
  script_tag(name:"cvss_base", value:"8.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:M/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-02-14 00:22:06 +0000 (Wed, 14 Feb 2024)");

  script_cve_id("CVE-2023-36484", "CVE-2023-36485", "CVE-2023-36486");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("ILIAS < 7.23, 8.x < 8.3 Multiple Vulnerabilities");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_ilias_http_detect.nasl");
  script_mandatory_keys("ilias/detected");

  script_tag(name:"summary", value:"ILIAS is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following flaws exist:

  - CVE-2023-36484 / 37374: [File] Potential reflected cross-site scripting (XSS)

  - 37350: [Workflow Engine] Deletion Workflowengine

  - CVE-2023-36485: Remote Code Execution in the Workflow Engine (BPMN2 parser)

  - CVE-2023-36486: Remote Code Execution in the Workflow Engine (malicious filename)");

  script_tag(name:"affected", value:"ILIAS prior to version 7.23 and 8.x prior to 8.3.");

  script_tag(name:"solution", value:"Update to version 7.23, 8.3 or later.");

  script_xref(name:"URL", value:"https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=35&obj_id=141711");
  script_xref(name:"URL", value:"https://docu.ilias.de/ilias.php?baseClass=illmpresentationgui&cmd=layout&ref_id=35&obj_id=141710");
  script_xref(name:"URL", value:"https://docu.ilias.de/ilias.php?baseClass=ilrepositorygui&cmdNode=xd:kx:54&cmdClass=ilBlogPostingGUI&cmd=previewFullscreen&ref_id=3439&prvm=fsc&bmn=2023-12&blpg=786");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less(version: version, test_version: "7.23")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "7.23", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range_exclusive(version: version, test_version_lo: "8.0", test_version_up: "8.3")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "8.3", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Nov 2023 00:00Current
7High risk
Vulners AI Score7
CVSS37.2
EPSS0.00496
SSVC
10
.json
Report