Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310811133
HistoryMay 30, 2017 - 12:00 a.m.

Nextcloud Multiple Vulnerabilities-01 (May 2017) - Linux

2017-05-3000:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

33.0%

Nextcloud is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later

CPE = "cpe:/a:nextcloud:nextcloud_server";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.811133");
  script_version("2024-02-09T05:06:25+0000");
  script_cve_id("CVE-2017-0890", "CVE-2017-0892", "CVE-2017-0894");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_tag(name:"last_modification", value:"2024-02-09 05:06:25 +0000 (Fri, 09 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2022-09-27 16:04:00 +0000 (Tue, 27 Sep 2022)");
  script_tag(name:"creation_date", value:"2017-05-30 16:55:47 +0530 (Tue, 30 May 2017)");
  script_name("Nextcloud Multiple Vulnerabilities-01 (May 2017) - Linux");

  script_tag(name:"summary", value:"Nextcloud is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - An inadequate escaping in the search module.

  - An improper session handling allowed an application specific password without
    permission to the files access to the users file.

  - A logical error which cause disclosure of valid share tokens for public
    calendars.");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker
  to write or paste malicious content into the search dialogue, or granting an
  attacker potentially access to publicly shared calendars without knowing the share
  token, or allow an application specific password without permission to the files
  access to the users file.");

  script_tag(name:"affected", value:"Nextcloud Server before 11.0.3 on Linux.");

  script_tag(name:"solution", value:"Upgrade to Nextcloud Server 11.0.3 or
  later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_xref(name:"URL", value:"https://nextcloud.com/security/advisory/?id=nc-sa-2017-007");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98408");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98441");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98442");
  script_xref(name:"URL", value:"https://nextcloud.com/security/advisory/?id=nc-sa-2017-009");
  script_xref(name:"URL", value:"https://nextcloud.com/security/advisory/?id=nc-sa-2017-011");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_nextcloud_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("nextcloud/installed", "Host/runs_unixoide");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!port = get_app_port(cpe:CPE))
  exit(0);

if(!vers = get_app_version(cpe:CPE, port:port))
  exit(0);

if(version_is_less(version:vers, test_version:"11.0.3")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"11.0.3");
  security_message(data:report, port:port);
  exit(0);
}

exit(99);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

4.5

Confidence

High

EPSS

0.001

Percentile

33.0%

Related for OPENVAS:1361412562310811133