Cisco Prime Provisioning Multiple Vulnerabilities (May 2017
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:cisco:prime_collaboration_provisioning";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811050");
script_version("2024-02-19T05:05:57+0000");
script_cve_id("CVE-2017-6622", "CVE-2017-6635");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2024-02-19 05:05:57 +0000 (Mon, 19 Feb 2024)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_tag(name:"creation_date", value:"2017-05-23 10:50:56 +0530 (Tue, 23 May 2017)");
script_name("Cisco Prime Provisioning Multiple Vulnerabilities (May 2017)");
script_tag(name:"summary", value:"cisco prime collaboration provisioning is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- Missing security constraints in certain HTTP request methods, which could
allow access to files via the web interface.
- The affected software does not perform proper input validation of HTTP
requests and fails to apply role-based access controls (RBACs) to requested
HTTP URLs.");
script_tag(name:"impact", value:"Successful exploitation will allow an
unauthenticated, remote attacker to bypass authentication and perform command
injection with root privileges. Also an authenticated remote attacker can
delete any file from an affected system.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"affected", value:"Cisco Prime Collaboration Provisioning
Software Releases 9.0.0, 9.5.0, 10.0.0, 10.5.0, 10.5.1 and 10.6 through 11.5");
script_tag(name:"solution", value:"Upgrade to Cisco Prime Collaboration
Provisioning Software Release 12.1 or later. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc98724");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98520");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98535");
script_xref(name:"URL", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc99597");
script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp1");
script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-pcp3");
script_category(ACT_GATHER_INFO);
script_family("CISCO");
script_copyright("Copyright (C) 2017 Greenbone AG");
script_dependencies("gb_cisco_pcp_version.nasl");
script_mandatory_keys("cisco_pcp/version");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if(!version = get_app_version(cpe:CPE)) exit(0);
if(version =~ "^((9|10|11)\.)")
{
if((version == "9.0.0")|| (version == "9.5.0")|| (version == "10.0.0")||
(version == "10.5.0")||(version == "10.5.1")||(version == "10.6.0")||
(version == "10.6.2")||(version == "11.0.0")||(version == "11.1.0")||
(version == "11.5.0"))
{
report = report_fixed_ver(installed_version:version, fixed_version:"12.1");
security_message(data:report, port:0);
exit(0);
}
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo