ID OPENVAS:136141256231064547 Type openvas Reporter Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com Modified 2018-04-06T00:00:00
Description
The remote host is missing an update to drupal-date
announced via advisory FEDORA-2009-8184.
# OpenVAS Vulnerability Test
# $Id: fcore_2009_8184.nasl 9350 2018-04-06 07:03:33Z cfischer $
# Description: Auto-generated from advisory FEDORA-2009-8184 (drupal-date)
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# or at your option, GNU General Public License version 3,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "The Date API is available to be used by other modules and is not dependent
on having CCK installed. The date module is a flexible date/time field
type for the cck content module which requires the CCK content.module and
the Date API module.
Update Information:
* Advisory ID: DRUPAL-SA-CONTRIB-2009-046
* Project: Date (third-party module)
* Version: 6.x
* Date: 2009-July-29
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
The Date module provides a date CCK field that can be added to any content
type. The Date Tools module that is bundled with Date module does not properly
escape user input when displaying labels for fields on a content type. A
malicious user with the 'use date tools' permission of the Date Tools sub-
module, or the 'administer content types' permission could attempt a cross site
scripting (XSS) attack when creating a new content type, leading to the
user gaining full administrative access.
ChangeLog:
* Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0
- Update to new version.
- Fix for DRUPAL-SA-CONTRIB-2009-046.
* Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild";
tag_solution = "Apply the appropriate updates.
This update can be installed with the yum update program. Use
su -c 'yum update drupal-date' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8184";
tag_summary = "The remote host is missing an update to drupal-date
announced via advisory FEDORA-2009-8184.";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.64547");
script_cve_id("CVE-2009-3156");
script_version("$Revision: 9350 $");
script_tag(name:"last_modification", value:"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $");
script_tag(name:"creation_date", value:"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)");
script_tag(name:"cvss_base", value:"2.1");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:S/C:N/I:P/A:N");
script_name("Fedora Core 11 FEDORA-2009-8184 (drupal-date)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-rpm.inc");
res = "";
report = "";
if ((res = isrpmvuln(pkg:"drupal-date", rpm:"drupal-date~6.x.2.3~0.fc11", rls:"FC11")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:136141256231064547", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Core 11 FEDORA-2009-8184 (drupal-date)", "description": "The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8184.", "published": "2009-08-17T00:00:00", "modified": "2018-04-06T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/", "score": 2.1}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064547", "reporter": "Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com", "references": [], "cvelist": ["CVE-2009-3156"], "lastseen": "2018-04-06T11:37:26", "viewCount": 1, "enchantments": {"score": {"value": 5.3, "vector": "NONE", "modified": "2018-04-06T11:37:26", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-3156"]}, {"type": "openvas", "idList": ["OPENVAS:136141256231064546", "OPENVAS:64547", "OPENVAS:64546"]}, {"type": "nessus", "idList": ["FEDORA_2009-8184.NASL", "FEDORA_2009-8162.NASL"]}], "modified": "2018-04-06T11:37:26", "rev": 2}, "vulnersScore": 5.3}, "pluginID": "136141256231064547", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8184.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8184 (drupal-date)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Date API is available to be used by other modules and is not dependent\non having CCK installed. The date module is a flexible date/time field\ntype for the cck content module which requires the CCK content.module and\nthe Date API module.\n\nUpdate Information:\n\n* Advisory ID: DRUPAL-SA-CONTRIB-2009-046\n* Project: Date (third-party module)\n* Version: 6.x\n* Date: 2009-July-29\n* Security risk: Moderately critical\n* Exploitable from: Remote\n* Vulnerability: Cross Site Scripting\n\nThe Date module provides a date CCK field that can be added to any content\ntype. The Date Tools module that is bundled with Date module does not properly\nescape user input when displaying labels for fields on a content type. A\nmalicious user with the 'use date tools' permission of the Date Tools sub-\nmodule, or the 'administer content types' permission could attempt a cross site\nscripting (XSS) attack when creating a new content type, leading to the\nuser gaining full administrative access.\n\nChangeLog:\n\n* Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0\n- Update to new version.\n- Fix for DRUPAL-SA-CONTRIB-2009-046.\n* Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update drupal-date' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8184\";\ntag_summary = \"The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8184.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64547\");\n script_cve_id(\"CVE-2009-3156\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_name(\"Fedora Core 11 FEDORA-2009-8184 (drupal-date)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"drupal-date\", rpm:\"drupal-date~6.x.2.3~0.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Fedora Local Security Checks", "immutableFields": []}
{"cve": [{"lastseen": "2021-02-02T05:40:05", "description": "Cross-site scripting (XSS) vulnerability in the Date Tools sub-module in the Date module 6.x before 6.x-2.3 for Drupal allows remote authenticated users, with \"use date tools\" or \"administer content types\" privileges, to inject arbitrary web script or HTML via a \"Content type label\" field.", "edition": 4, "cvss3": {}, "published": "2009-09-10T18:30:00", "title": "CVE-2009-3156", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 2.1, "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-3156"], "modified": "2017-08-17T01:31:00", "cpe": ["cpe:/a:karen_stevenson:date:6.x-1.x-dev", "cpe:/a:karen_stevenson:date:6.x-2.0-beta2", "cpe:/a:karen_stevenson:date:6.x-1.0-beta", "cpe:/a:karen_stevenson:date:6.x-2.1", "cpe:/a:drupal:drupal:*", "cpe:/a:karen_stevenson:date:6.x-2.0-beta3", "cpe:/a:karen_stevenson:date:6.x-2.0-beta4", "cpe:/a:karen_stevenson:date:6.x-2.0", "cpe:/a:karen_stevenson:date:6.x-2.0-beta", "cpe:/a:karen_stevenson:date:6.x-2.2"], "id": "CVE-2009-3156", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3156", "cvss": {"score": 2.1, "vector": "AV:N/AC:H/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:karen_stevenson:date:6.x-2.1:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-1.0-beta:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0-beta:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0-beta4:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0-beta2:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.0-beta3:*:*:*:*:*:*:*", "cpe:2.3:a:karen_stevenson:date:6.x-2.2:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2017-07-25T10:56:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3156"], "description": "The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8184.", "modified": "2017-07-10T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:64547", "href": "http://plugins.openvas.org/nasl.php?oid=64547", "type": "openvas", "title": "Fedora Core 11 FEDORA-2009-8184 (drupal-date)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8184.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8184 (drupal-date)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Date API is available to be used by other modules and is not dependent\non having CCK installed. The date module is a flexible date/time field\ntype for the cck content module which requires the CCK content.module and\nthe Date API module.\n\nUpdate Information:\n\n* Advisory ID: DRUPAL-SA-CONTRIB-2009-046\n* Project: Date (third-party module)\n* Version: 6.x\n* Date: 2009-July-29\n* Security risk: Moderately critical\n* Exploitable from: Remote\n* Vulnerability: Cross Site Scripting\n\nThe Date module provides a date CCK field that can be added to any content\ntype. The Date Tools module that is bundled with Date module does not properly\nescape user input when displaying labels for fields on a content type. A\nmalicious user with the 'use date tools' permission of the Date Tools sub-\nmodule, or the 'administer content types' permission could attempt a cross site\nscripting (XSS) attack when creating a new content type, leading to the\nuser gaining full administrative access.\n\nChangeLog:\n\n* Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0\n- Update to new version.\n- Fix for DRUPAL-SA-CONTRIB-2009-046.\n* Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update drupal-date' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8184\";\ntag_summary = \"The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8184.\";\n\n\n\nif(description)\n{\n script_id(64547);\n script_cve_id(\"CVE-2009-3156\");\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_name(\"Fedora Core 11 FEDORA-2009-8184 (drupal-date)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"drupal-date\", rpm:\"drupal-date~6.x.2.3~0.fc11\", rls:\"FC11\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-04-06T11:40:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3156"], "description": "The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8162.", "modified": "2018-04-06T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:136141256231064546", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231064546", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-8162 (drupal-date)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8162.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8162 (drupal-date)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Date API is available to be used by other modules and is not dependent\non having CCK installed. The date module is a flexible date/time field\ntype for the cck content module which requires the CCK content.module and\nthe Date API module.\n\nUpdate Information:\n\n* Advisory ID: DRUPAL-SA-CONTRIB-2009-046\n* Project: Date (third-party module)\n* Version: 6.x\n* Date: 2009-July-29\n* Security risk: Moderately critical\n* Exploitable from: Remote\n* Vulnerability: Cross Site Scripting\n\nThe Date module provides a date CCK field that can be added to any content\ntype. The Date Tools module that is bundled with Date module does not properly\nescape user input when displaying labels for fields on a content type. A\nmalicious user with the 'use date tools' permission of the Date Tools sub-\nmodule, or the 'administer content types' permission could attempt a cross site\nscripting (XSS) attack when creating a new content type, leading to the\nuser gaining full administrative access.\n\n-------- VERSIONS AFFECTED\nprior to 6.x-2.3 Drupal core is not affected. If you do not use the\ncontributed Date module, there is nothing you need to do.\n\nChangeLog:\n\n* Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0\n- Update to new version.\n- Fix for DRUPAL-SA-CONTRIB-2009-046.\n* Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update drupal-date' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8162\";\ntag_summary = \"The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8162.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.64546\");\n script_cve_id(\"CVE-2009-3156\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_name(\"Fedora Core 10 FEDORA-2009-8162 (drupal-date)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"drupal-date\", rpm:\"drupal-date~6.x.2.3~0.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-25T10:57:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3156"], "description": "The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8162.", "modified": "2017-07-10T00:00:00", "published": "2009-08-17T00:00:00", "id": "OPENVAS:64546", "href": "http://plugins.openvas.org/nasl.php?oid=64546", "type": "openvas", "title": "Fedora Core 10 FEDORA-2009-8162 (drupal-date)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: fcore_2009_8162.nasl 6624 2017-07-10 06:11:55Z cfischer $\n# Description: Auto-generated from advisory FEDORA-2009-8162 (drupal-date)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Date API is available to be used by other modules and is not dependent\non having CCK installed. The date module is a flexible date/time field\ntype for the cck content module which requires the CCK content.module and\nthe Date API module.\n\nUpdate Information:\n\n* Advisory ID: DRUPAL-SA-CONTRIB-2009-046\n* Project: Date (third-party module)\n* Version: 6.x\n* Date: 2009-July-29\n* Security risk: Moderately critical\n* Exploitable from: Remote\n* Vulnerability: Cross Site Scripting\n\nThe Date module provides a date CCK field that can be added to any content\ntype. The Date Tools module that is bundled with Date module does not properly\nescape user input when displaying labels for fields on a content type. A\nmalicious user with the 'use date tools' permission of the Date Tools sub-\nmodule, or the 'administer content types' permission could attempt a cross site\nscripting (XSS) attack when creating a new content type, leading to the\nuser gaining full administrative access.\n\n-------- VERSIONS AFFECTED\nprior to 6.x-2.3 Drupal core is not affected. If you do not use the\ncontributed Date module, there is nothing you need to do.\n\nChangeLog:\n\n* Wed Jul 29 2009 Jon Ciesla - 6.x.2.3-0\n- Update to new version.\n- Fix for DRUPAL-SA-CONTRIB-2009-046.\n* Fri Jul 24 2009 Fedora Release Engineering - 6.x.2.0-2.rc4.2\n- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild\";\ntag_solution = \"Apply the appropriate updates.\n\nThis update can be installed with the yum update program. Use \nsu -c 'yum update drupal-date' at the command line.\nFor more information, refer to Managing Software with yum,\navailable at http://docs.fedoraproject.org/yum/.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8162\";\ntag_summary = \"The remote host is missing an update to drupal-date\nannounced via advisory FEDORA-2009-8162.\";\n\n\n\nif(description)\n{\n script_id(64546);\n script_cve_id(\"CVE-2009-3156\");\n script_version(\"$Revision: 6624 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:11:55 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-08-17 16:54:45 +0200 (Mon, 17 Aug 2009)\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_name(\"Fedora Core 10 FEDORA-2009-8162 (drupal-date)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"drupal-date\", rpm:\"drupal-date~6.x.2.3~0.fc10\", rls:\"FC10\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:NETWORK/AC:HIGH/Au:SINGLE_INSTANCE/C:NONE/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2021-01-12T10:07:33", "description": " - Advisory ID: DRUPAL-SA-CONTRIB-2009-046 * Project: Date\n (third-party module) * Version: 6.x * Date: 2009-July-29\n * Security risk: Moderately critical * Exploitable from:\n Remote * Vulnerability: Cross Site Scripting --------\n DESCRIPTION\n --------------------------------------------------------\n - The Date module provides a date CCK field that can be\n added to any content type. The Date Tools module that is\n bundled with Date module does not properly escape user\n input when displaying labels for fields on a content\n type. A malicious user with the 'use date tools'\n permission of the Date Tools sub- module, or the\n 'administer content types' permission could attempt a\n cross site scripting [1] (XSS) attack when creating a\n new content type, leading to the user gaining full\n administrative access. -------- VERSIONS AFFECTED\n --------------------------------------------------- *\n Date for Drupal 6.x prior to 6.x-2.3 Drupal core is not\n affected. If you do not use the contributed Date module,\n there is nothing you need to do. -------- SOLUTION\n --------------------------------------------------------\n ---- Upgrade to the latest version: * If you use Date\n for Drupal 6.x upgrade to Date 6.x-2.3 [2] Note that the\n 'use date tools' permission has been renamed as\n 'administer date tools' to clarify that this is an\n administrative permission (it allows the creation of new\n content types via a wizard form). You will need to\n re-assign this permission to any roles that were using\n it. See also the Date project page [3]. --------\n REPORTED BY\n --------------------------------------------------------\n - Stella Power [4] of the Drupal Security Team --------\n FIXED BY\n --------------------------------------------------------\n ---- Stella Power [5] and Karen Stevenson [6], the\n project maintainer. -------- CONTACT\n --------------------------------------------------------\n ----- The security contact for Drupal can be reached at\n security at drupal.org or via the form at\n http://drupal.org/contact. [1]\n http://en.wikipedia.org/wiki/Cross-site_scripting [2]\n http://drupal.org/node/534332 [3]\n http://drupal.org/project/date [4]\n http://drupal.org/user/66894 [5]\n http://drupal.org/user/66894 [6]\n http://drupal.org/user/45874\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2009-08-01T00:00:00", "title": "Fedora 10 : drupal-date-6.x.2.3-0.fc10 (2009-8162)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3156"], "modified": "2009-08-01T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:10", "p-cpe:/a:fedoraproject:fedora:drupal-date"], "id": "FEDORA_2009-8162.NASL", "href": "https://www.tenable.com/plugins/nessus/40455", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-8162.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40455);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-3156\");\n script_bugtraq_id(35790);\n script_xref(name:\"FEDORA\", value:\"2009-8162\");\n\n script_name(english:\"Fedora 10 : drupal-date-6.x.2.3-0.fc10 (2009-8162)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Advisory ID: DRUPAL-SA-CONTRIB-2009-046 * Project: Date\n (third-party module) * Version: 6.x * Date: 2009-July-29\n * Security risk: Moderately critical * Exploitable from:\n Remote * Vulnerability: Cross Site Scripting --------\n DESCRIPTION\n --------------------------------------------------------\n - The Date module provides a date CCK field that can be\n added to any content type. The Date Tools module that is\n bundled with Date module does not properly escape user\n input when displaying labels for fields on a content\n type. A malicious user with the 'use date tools'\n permission of the Date Tools sub- module, or the\n 'administer content types' permission could attempt a\n cross site scripting [1] (XSS) attack when creating a\n new content type, leading to the user gaining full\n administrative access. -------- VERSIONS AFFECTED\n --------------------------------------------------- *\n Date for Drupal 6.x prior to 6.x-2.3 Drupal core is not\n affected. If you do not use the contributed Date module,\n there is nothing you need to do. -------- SOLUTION\n --------------------------------------------------------\n ---- Upgrade to the latest version: * If you use Date\n for Drupal 6.x upgrade to Date 6.x-2.3 [2] Note that the\n 'use date tools' permission has been renamed as\n 'administer date tools' to clarify that this is an\n administrative permission (it allows the creation of new\n content types via a wizard form). You will need to\n re-assign this permission to any roles that were using\n it. See also the Date project page [3]. --------\n REPORTED BY\n --------------------------------------------------------\n - Stella Power [4] of the Drupal Security Team --------\n FIXED BY\n --------------------------------------------------------\n ---- Stella Power [5] and Karen Stevenson [6], the\n project maintainer. -------- CONTACT\n --------------------------------------------------------\n ----- The security contact for Drupal can be reached at\n security at drupal.org or via the form at\n http://drupal.org/contact. [1]\n http://en.wikipedia.org/wiki/Cross-site_scripting [2]\n http://drupal.org/node/534332 [3]\n http://drupal.org/project/date [4]\n http://drupal.org/user/66894 [5]\n http://drupal.org/user/66894 [6]\n http://drupal.org/user/45874\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/534332\"\n );\n # http://drupal.org/project/date\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.drupal.org/project/date\"\n );\n # http://en.wikipedia.org/wiki/Cross-site_scripting\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://en.wikipedia.org/wiki/Cross-site_scripting\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/027241.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?31807578\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal-date package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal-date\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^10([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 10.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC10\", reference:\"drupal-date-6.x.2.3-0.fc10\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal-date\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:N/AC:H/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:07:33", "description": " - Advisory ID: DRUPAL-SA-CONTRIB-2009-046 * Project: Date\n (third-party module) * Version: 6.x * Date: 2009-July-29\n * Security risk: Moderately critical * Exploitable from:\n Remote * Vulnerability: Cross Site Scripting --------\n DESCRIPTION\n --------------------------------------------------------\n - The Date module provides a date CCK field that can be\n added to any content type. The Date Tools module that is\n bundled with Date module does not properly escape user\n input when displaying labels for fields on a content\n type. A malicious user with the 'use date tools'\n permission of the Date Tools sub- module, or the\n 'administer content types' permission could attempt a\n cross site scripting [1] (XSS) attack when creating a\n new content type, leading to the user gaining full\n administrative access. -------- VERSIONS AFFECTED\n --------------------------------------------------- *\n Date for Drupal 6.x prior to 6.x-2.3 Drupal core is not\n affected. If you do not use the contributed Date module,\n there is nothing you need to do. -------- SOLUTION\n --------------------------------------------------------\n ---- Upgrade to the latest version: * If you use Date\n for Drupal 6.x upgrade to Date 6.x-2.3 [2] Note that the\n 'use date tools' permission has been renamed as\n 'administer date tools' to clarify that this is an\n administrative permission (it allows the creation of new\n content types via a wizard form). You will need to\n re-assign this permission to any roles that were using\n it. See also the Date project page [3]. --------\n REPORTED BY\n --------------------------------------------------------\n - Stella Power [4] of the Drupal Security Team --------\n FIXED BY\n --------------------------------------------------------\n ---- Stella Power [5] and Karen Stevenson [6], the\n project maintainer. -------- CONTACT\n --------------------------------------------------------\n ----- The security contact for Drupal can be reached at\n security at drupal.org or via the form at\n http://drupal.org/contact. [1]\n http://en.wikipedia.org/wiki/Cross-site_scripting [2]\n http://drupal.org/node/534332 [3]\n http://drupal.org/project/date [4]\n http://drupal.org/user/66894 [5]\n http://drupal.org/user/66894 [6]\n http://drupal.org/user/45874\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 27, "published": "2009-08-01T00:00:00", "title": "Fedora 11 : drupal-date-6.x.2.3-0.fc11 (2009-8184)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-3156"], "modified": "2009-08-01T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:drupal-date", "cpe:/o:fedoraproject:fedora:11"], "id": "FEDORA_2009-8184.NASL", "href": "https://www.tenable.com/plugins/nessus/40456", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2009-8184.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(40456);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2009-3156\");\n script_bugtraq_id(35790);\n script_xref(name:\"FEDORA\", value:\"2009-8184\");\n\n script_name(english:\"Fedora 11 : drupal-date-6.x.2.3-0.fc11 (2009-8184)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Advisory ID: DRUPAL-SA-CONTRIB-2009-046 * Project: Date\n (third-party module) * Version: 6.x * Date: 2009-July-29\n * Security risk: Moderately critical * Exploitable from:\n Remote * Vulnerability: Cross Site Scripting --------\n DESCRIPTION\n --------------------------------------------------------\n - The Date module provides a date CCK field that can be\n added to any content type. The Date Tools module that is\n bundled with Date module does not properly escape user\n input when displaying labels for fields on a content\n type. A malicious user with the 'use date tools'\n permission of the Date Tools sub- module, or the\n 'administer content types' permission could attempt a\n cross site scripting [1] (XSS) attack when creating a\n new content type, leading to the user gaining full\n administrative access. -------- VERSIONS AFFECTED\n --------------------------------------------------- *\n Date for Drupal 6.x prior to 6.x-2.3 Drupal core is not\n affected. If you do not use the contributed Date module,\n there is nothing you need to do. -------- SOLUTION\n --------------------------------------------------------\n ---- Upgrade to the latest version: * If you use Date\n for Drupal 6.x upgrade to Date 6.x-2.3 [2] Note that the\n 'use date tools' permission has been renamed as\n 'administer date tools' to clarify that this is an\n administrative permission (it allows the creation of new\n content types via a wizard form). You will need to\n re-assign this permission to any roles that were using\n it. See also the Date project page [3]. --------\n REPORTED BY\n --------------------------------------------------------\n - Stella Power [4] of the Drupal Security Team --------\n FIXED BY\n --------------------------------------------------------\n ---- Stella Power [5] and Karen Stevenson [6], the\n project maintainer. -------- CONTACT\n --------------------------------------------------------\n ----- The security contact for Drupal can be reached at\n security at drupal.org or via the form at\n http://drupal.org/contact. [1]\n http://en.wikipedia.org/wiki/Cross-site_scripting [2]\n http://drupal.org/node/534332 [3]\n http://drupal.org/project/date [4]\n http://drupal.org/user/66894 [5]\n http://drupal.org/user/66894 [6]\n http://drupal.org/user/45874\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/534332\"\n );\n # http://drupal.org/project/date\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.drupal.org/project/date\"\n );\n # http://en.wikipedia.org/wiki/Cross-site_scripting\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://en.wikipedia.org/wiki/Cross-site_scripting\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2009-July/027268.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?3343e02e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected drupal-date package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:S/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:drupal-date\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^11([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 11.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC11\", reference:\"drupal-date-6.x.2.3-0.fc11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"drupal-date\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:N/AC:H/Au:S/C:N/I:P/A:N"}}]}