Lucene search

K
openvasCopyright (C) 2015 Greenbone Networks GmbHOPENVAS:1361412562310806508
HistoryOct 20, 2015 - 12:00 a.m.

Revive Adserver < 3.2.2 Multiple Vulnerabilities (REVIVE-SA-2015-001)

2015-10-2000:00:00
Copyright (C) 2015 Greenbone Networks GmbH
plugins.openvas.org
35

6.4 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.0%

Revive Adserver is prone to multiple vulnerabilities.

# Copyright (C) 2015 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

CPE = "cpe:/a:revive:adserver";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.806508");
  script_version("2021-07-22T08:07:23+0000");
  script_cve_id("CVE-2015-7364", "CVE-2015-7365", "CVE-2015-7366", "CVE-2015-7367",
                "CVE-2015-7368", "CVE-2015-7369", "CVE-2015-7370", "CVE-2015-7371",
                "CVE-2015-7372", "CVE-2015-7373");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2021-07-22 08:07:23 +0000 (Thu, 22 Jul 2021)");
  script_tag(name:"creation_date", value:"2015-10-20 15:41:06 +0530 (Tue, 20 Oct 2015)");
  script_tag(name:"qod_type", value:"remote_banner");
  script_name("Revive Adserver < 3.2.2 Multiple Vulnerabilities (REVIVE-SA-2015-001)");

  script_tag(name:"summary", value:"Revive Adserver is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - Some plugin actions (e.g. enabling, disabling) could be performed via GET without any CSRF
  protection mechanism.

  - 'account-user-*.php' scripts not checking the CSRF token sent via POST request.

  - Insufficient restriction on accessing cached copies of pages visited in Revive Adserver's admin
  UI.

  - Default Flash cross-domain policy (crossdomain.xml) does not restrict access cross domain access

  - Insufficient sanitization of user-supplied input via 'id' and 'data-file' parameters in
  the 'open-flash-chart.swf' script.

  - 'run-mpe.php' script used by the admin UI lacks proper authentication and access control.

  - Insufficient sanitization of user-supplied input via 'layerstyle' parameter in the 'al.php'
  script.

  - 'magic-macros' feature in Revive Adserver does not sanitize user supplied input via different
  GET parameters.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to execute
  arbitrary HTML and script code in a user's browser session in the context of the affected site, to
  disrupt service, to corrupt information, to conduct cross domain attacks, to cause a denial of
  service, include and execute arbitrary local files and to perform some unspecified actions and
  allow local attackers to obtain sensitive information.");

  script_tag(name:"affected", value:"Revive Adserver versions before 3.2.2.");

  script_tag(name:"solution", value:"Upgrade version 3.2.2 or later.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_xref(name:"URL", value:"https://packetstormsecurity.com/files/133893");
  script_xref(name:"URL", value:"http://seclists.org/fulldisclosure/2015/Oct/32");
  script_xref(name:"URL", value:"https://www.revive-adserver.com/security/revive-sa-2015-001/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/archive/1/536633/100/0/threaded");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2015 Greenbone Networks GmbH");
  script_family("Web application abuses");
  script_dependencies("gb_revive_adserver_detect.nasl");
  script_mandatory_keys("ReviveAdserver/Installed");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if(!port = get_app_port(cpe:CPE))
  exit(0);

if(!vers = get_app_version(cpe:CPE, port:port))
  exit(0);

if(version_is_less(version:vers, test_version:"3.2.2")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"3.2.2");
  security_message(port:port, data:report);
  exit(0);
}

exit(99);

6.4 Medium

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.0%

Related for OPENVAS:1361412562310806508