ID OPENVAS:867687 Type openvas Reporter Copyright (C) 2014 Greenbone Networks GmbH Modified 2017-07-10T00:00:00
Description
Check for the Version of mod_security
###############################################################################
# OpenVAS Vulnerability Test
#
# Fedora Update for mod_security FEDORA-2014-4720
#
# Authors:
# System Generated Check
#
# Copyright:
# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
include("revisions-lib.inc");
if(description)
{
script_id(867687);
script_version("$Revision: 6629 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $");
script_tag(name:"creation_date", value:"2014-04-15 09:41:58 +0530 (Tue, 15 Apr 2014)");
script_cve_id("CVE-2013-5705");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_name("Fedora Update for mod_security FEDORA-2014-4720");
tag_insight = "ModSecurity is an open source intrusion detection and prevention engine
for web applications. It operates embedded into the web server, acting
as a powerful umbrella - shielding web applications from attacks.
";
tag_affected = "mod_security on Fedora 19";
tag_solution = "Please Install the Updated Packages.";
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name: "FEDORA", value: "2014-4720");
script_xref(name: "URL" , value: "https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131335.html");
script_summary("Check for the Version of mod_security");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone Networks GmbH");
script_family("Fedora Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms");
exit(0);
}
include("pkg-lib-rpm.inc");
release = get_kb_item("ssh/login/release");
res = "";
if(release == NULL){
exit(0);
}
if(release == "FC19")
{
if ((res = isrpmvuln(pkg:"mod_security", rpm:"mod_security~2.7.5~3.fc19", rls:"FC19")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99); # Not vulnerable.
exit(0);
}
{"id": "OPENVAS:867687", "type": "openvas", "bulletinFamily": "scanner", "title": "Fedora Update for mod_security FEDORA-2014-4720", "description": "Check for the Version of mod_security", "published": "2014-04-15T00:00:00", "modified": "2017-07-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=867687", "reporter": "Copyright (C) 2014 Greenbone Networks GmbH", "references": ["https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131335.html", "2014-4720"], "cvelist": ["CVE-2013-5705"], "lastseen": "2017-07-25T10:48:32", "viewCount": 0, "enchantments": {"score": {"value": 6.4, "vector": "NONE", "modified": "2017-07-25T10:48:32", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2013-5705", "CVE-2014-4720"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2014-081.NASL", "DEBIAN_DLA-34.NASL", "MODSECURITY_2_7_6.NASL", "ALA_ALAS-2014-335.NASL", "DEBIAN_DSA-2991.NASL", "FEDORA_2014-4720.NASL", "ALA_ALAS-2014-334.NASL", "OPENSUSE-2014-501.NASL", "FEDORA_2014-4633.NASL", "SUSE_11_APACHE2-MOD_SECURITY2-140807.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310120049", "OPENVAS:1361412562310867691", "OPENVAS:1361412562310120050", "OPENVAS:1361412562310702991", "OPENVAS:1361412562310867687", "OPENVAS:1361412562310850602", "OPENVAS:702991", "OPENVAS:867691"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2991-1:00147", "DEBIAN:DLA-34-1:B9A50"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13761", "SECURITYVULNS:DOC:30709"]}, {"type": "amazon", "idList": ["ALAS-2014-334", "ALAS-2014-335"]}, {"type": "seebug", "idList": ["SSV:62035"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2014:0969-1"]}], "modified": "2017-07-25T10:48:32", "rev": 2}, "vulnersScore": 6.4}, "pluginID": "867687", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mod_security FEDORA-2014-4720\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867687);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-15 09:41:58 +0530 (Tue, 15 Apr 2014)\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"Fedora Update for mod_security FEDORA-2014-4720\");\n\n tag_insight = \"ModSecurity is an open source intrusion detection and prevention engine\nfor web applications. It operates embedded into the web server, acting\nas a powerful umbrella - shielding web applications from attacks.\n\";\n\n tag_affected = \"mod_security on Fedora 19\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4720\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131335.html\");\n script_summary(\"Check for the Version of mod_security\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_security\", rpm:\"mod_security~2.7.5~3.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "naslFamily": "Fedora Local Security Checks"}
{"cve": [{"lastseen": "2020-12-09T19:52:46", "description": "apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.", "edition": 5, "cvss3": {}, "published": "2014-04-15T10:55:00", "title": "CVE-2013-5705", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2013-5705"], "modified": "2014-12-03T03:00:00", "cpe": ["cpe:/a:modsecurity:modsecurity:2.6.1", "cpe:/a:modsecurity:modsecurity:2.1.3", "cpe:/a:modsecurity:modsecurity:2.7.0", "cpe:/a:modsecurity:modsecurity:2.1.5", "cpe:/a:modsecurity:modsecurity:2.5.7", "cpe:/a:modsecurity:modsecurity:2.7.2", "cpe:/a:modsecurity:modsecurity:2.1.2", "cpe:/a:modsecurity:modsecurity:2.0.1", "cpe:/a:modsecurity:modsecurity:2.5.10", "cpe:/a:modsecurity:modsecurity:2.5.13", "cpe:/a:modsecurity:modsecurity:2.6.8", "cpe:/a:modsecurity:modsecurity:2.0.0", "cpe:/a:modsecurity:modsecurity:2.5.6", "cpe:/a:modsecurity:modsecurity:2.6.4", "cpe:/a:modsecurity:modsecurity:2.5.5", "cpe:/a:modsecurity:modsecurity:2.5.11", "cpe:/a:modsecurity:modsecurity:2.1.0", "cpe:/a:modsecurity:modsecurity:2.6.7", "cpe:/a:modsecurity:modsecurity:2.5.12", "cpe:/a:modsecurity:modsecurity:2.1.6", "cpe:/a:modsecurity:modsecurity:2.6.3", "cpe:/a:modsecurity:modsecurity:2.5.4", "cpe:/a:modsecurity:modsecurity:2.1.1", "cpe:/a:modsecurity:modsecurity:2.7.3", "cpe:/a:modsecurity:modsecurity:2.5.1", "cpe:/a:modsecurity:modsecurity:2.0.3", "cpe:/a:modsecurity:modsecurity:2.6.0", "cpe:/a:modsecurity:modsecurity:2.6.2", "cpe:/a:modsecurity:modsecurity:2.0.2", "cpe:/a:modsecurity:modsecurity:2.7.1", "cpe:/a:modsecurity:modsecurity:2.1.4", "cpe:/a:modsecurity:modsecurity:2.5.9", "cpe:/a:modsecurity:modsecurity:2.5.8", "cpe:/a:modsecurity:modsecurity:2.5.3", "cpe:/a:modsecurity:modsecurity:2.5.2", "cpe:/a:modsecurity:modsecurity:2.0.4", "cpe:/a:modsecurity:modsecurity:2.6.5", "cpe:/a:modsecurity:modsecurity:2.7.5", "cpe:/a:modsecurity:modsecurity:2.5.0", "cpe:/a:modsecurity:modsecurity:2.7.4"], "id": "CVE-2013-5705", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5705", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:modsecurity:modsecurity:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.13:dev1:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:modsecurity:modsecurity:2.6.0:rc1:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-03-17T23:01:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120050", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120050", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-334)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120050\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:16:19 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-334)\");\n script_tag(name:\"insight\", value:\"apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.\");\n script_tag(name:\"solution\", value:\"Run yum update mod24_security to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-334.html\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"mod24_security-debuginfo\", rpm:\"mod24_security-debuginfo~2.7.3~3.24.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mod24_security\", rpm:\"mod24_security~2.7.3~3.24.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mlogc24\", rpm:\"mlogc24~2.7.3~3.24.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-25T10:48:38", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "Check for the Version of mod_security", "modified": "2017-07-10T00:00:00", "published": "2014-04-15T00:00:00", "id": "OPENVAS:867691", "href": "http://plugins.openvas.org/nasl.php?oid=867691", "type": "openvas", "title": "Fedora Update for mod_security FEDORA-2014-4633", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mod_security FEDORA-2014-4633\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\n\nif(description)\n{\n script_id(867691);\n script_version(\"$Revision: 6629 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:33:41 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-15 09:42:14 +0530 (Tue, 15 Apr 2014)\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"Fedora Update for mod_security FEDORA-2014-4633\");\n\n tag_insight = \"ModSecurity is an open source intrusion detection and prevention engine\nfor web applications. It operates embedded into the web server, acting\nas a powerful umbrella - shielding web applications from attacks.\n\";\n\n tag_affected = \"mod_security on Fedora 20\";\n\n tag_solution = \"Please Install the Updated Packages.\";\n\n\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name: \"FEDORA\", value: \"2014-4633\");\n script_xref(name: \"URL\" , value: \"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131375.html\");\n script_summary(\"Check for the Version of mod_security\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_security\", rpm:\"mod_security~2.7.5~3.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-08-03T10:48:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten the\nWeb application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.", "modified": "2017-07-19T00:00:00", "published": "2014-07-27T00:00:00", "id": "OPENVAS:702991", "href": "http://plugins.openvas.org/nasl.php?oid=702991", "type": "openvas", "title": "Debian Security Advisory DSA 2991-1 (modsecurity-apache - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2991.nasl 6759 2017-07-19 09:56:33Z teissa $\n# Auto-generated from advisory DSA 2991-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_affected = \"modsecurity-apache on Debian Linux\";\ntag_solution = \"For the stable distribution (wheezy), this problem has been fixed in\nversion 2.6.6-6+deb7u2.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 2.7.7-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.7.7-1.\n\nWe recommend that you upgrade your modsecurity-apache packages.\";\ntag_summary = \"Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten the\nWeb application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.\";\ntag_vuldetect = \"This check tests the installed software version using the apt package manager.\";\n\nif(description)\n{\n script_id(702991);\n script_version(\"$Revision: 6759 $\");\n script_cve_id(\"CVE-2013-5705\");\n script_name(\"Debian Security Advisory DSA 2991-1 (modsecurity-apache - security update)\");\n script_tag(name: \"last_modification\", value:\"$Date: 2017-07-19 11:56:33 +0200 (Wed, 19 Jul 2017) $\");\n script_tag(name: \"creation_date\", value:\"2014-07-27 00:00:00 +0200 (Sun, 27 Jul 2014)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2014/dsa-2991.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: tag_affected);\n# script_tag(name: \"impact\", value: tag_impact);\n script_tag(name: \"solution\", value: tag_solution);\n script_tag(name: \"summary\", value: tag_summary);\n script_tag(name: \"vuldetect\", value: tag_vuldetect);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libapache-mod-security\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-modsecurity\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache-mod-security\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-modsecurity\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache-mod-security\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-modsecurity\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.2\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache-mod-security\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libapache2-modsecurity\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7.3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2020-03-17T23:00:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2015-09-08T00:00:00", "id": "OPENVAS:1361412562310120049", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120049", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2014-335)", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120049\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 13:16:17 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2014-335)\");\n script_tag(name:\"insight\", value:\"apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.\");\n script_tag(name:\"solution\", value:\"Run yum update mod_security to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2014-335.html\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"mlogc\", rpm:\"mlogc~2.7.3~3.23.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mod_security\", rpm:\"mod_security~2.7.3~3.23.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"mod_security-debuginfo\", rpm:\"mod_security-debuginfo~2.7.3~3.23.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:37:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-04-15T00:00:00", "id": "OPENVAS:1361412562310867687", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867687", "type": "openvas", "title": "Fedora Update for mod_security FEDORA-2014-4720", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mod_security FEDORA-2014-4720\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867687\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-15 09:41:58 +0530 (Tue, 15 Apr 2014)\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"Fedora Update for mod_security FEDORA-2014-4720\");\n script_tag(name:\"affected\", value:\"mod_security on Fedora 19\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4720\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131335.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mod_security'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC19\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC19\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_security\", rpm:\"mod_security~2.7.5~3.fc19\", rls:\"FC19\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:37:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2014-04-15T00:00:00", "id": "OPENVAS:1361412562310867691", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310867691", "type": "openvas", "title": "Fedora Update for mod_security FEDORA-2014-4633", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for mod_security FEDORA-2014-4633\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.867691\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-04-15 09:42:14 +0530 (Tue, 15 Apr 2014)\");\n script_cve_id(\"CVE-2013-5705\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_name(\"Fedora Update for mod_security FEDORA-2014-4633\");\n script_tag(name:\"affected\", value:\"mod_security on Fedora 20\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"FEDORA\", value:\"2014-4633\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131375.html\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mod_security'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC20\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC20\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_security\", rpm:\"mod_security~2.7.5~3.fc20\", rls:\"FC20\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:37:16", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "description": "Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten the\nWeb application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.", "modified": "2019-03-19T00:00:00", "published": "2014-07-27T00:00:00", "id": "OPENVAS:1361412562310702991", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310702991", "type": "openvas", "title": "Debian Security Advisory DSA 2991-1 (modsecurity-apache - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2991.nasl 14302 2019-03-19 08:28:48Z cfischer $\n# Auto-generated from advisory DSA 2991-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.702991\");\n script_version(\"$Revision: 14302 $\");\n script_cve_id(\"CVE-2013-5705\");\n script_name(\"Debian Security Advisory DSA 2991-1 (modsecurity-apache - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-19 09:28:48 +0100 (Tue, 19 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2014-07-27 00:00:00 +0200 (Sun, 27 Jul 2014)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2014/dsa-2991.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2014 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB7\");\n script_tag(name:\"affected\", value:\"modsecurity-apache on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (wheezy), this problem has been fixed in\nversion 2.6.6-6+deb7u2.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 2.7.7-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.7.7-1.\n\nWe recommend that you upgrade your modsecurity-apache packages.\");\n script_tag(name:\"summary\", value:\"Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten the\nWeb application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libapache-mod-security\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libapache2-modsecurity\", ver:\"2.6.6-6+deb7u2\", rls:\"DEB7\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-01-31T18:39:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2014-0231", "CVE-2013-5705", "CVE-2014-0098", "CVE-2013-6438", "CVE-2014-0226"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2014-08-08T00:00:00", "id": "OPENVAS:1361412562310850602", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310850602", "type": "openvas", "title": "openSUSE: Security Advisory for security (openSUSE-SU-2014:0969-1)", "sourceData": "# Copyright (C) 2014 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.850602\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-08-08 05:58:45 +0200 (Fri, 08 Aug 2014)\");\n script_cve_id(\"CVE-2014-0226\", \"CVE-2013-5705\", \"CVE-2013-6438\", \"CVE-2014-0098\",\n \"CVE-2014-0231\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_name(\"openSUSE: Security Advisory for security (openSUSE-SU-2014:0969-1)\");\n\n script_tag(name:\"affected\", value:\"security on openSUSE 11.4\");\n\n script_tag(name:\"insight\", value:\"apache2:\n\n - ECC support was added to mod_ssl\n\n - fix for a race condition in mod_status known as CVE-2014-0226 can lead\n to information disclosure mod_status is not active by default, and is\n normally only open for connects from localhost.\n\n - fix for bug known as CVE-2014-0098 that can crash the apache process if\n a specially designed cookie is sent to the server (log_cookie.c)\n\n - fix for crash bug in mod_dav known as CVE-2013-6438\n\n - fix for a problem with non-responsive CGI scripts that would otherwise\n cause the server to stall and deny service. CVE-2014-0231, new\n configuration parameter CGIDScriptTimeout defaults to 60s.\n\n apache2-mod_security2:\n\n - specially drafted chunked http requests allow an attacker to bypass\n filters configured in mod_security2. This vulnerability is known as\n CVE-2013-5705.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"openSUSE-SU\", value:\"2014:0969-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'security'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSE11\\.4\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSE11.4\") {\n if(!isnull(res = isrpmvuln(pkg:\"apache2\", rpm:\"apache2~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-debuginfo\", rpm:\"apache2-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-debugsource\", rpm:\"apache2-debugsource~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-devel\", rpm:\"apache2-devel~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-event\", rpm:\"apache2-event~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-event-debuginfo\", rpm:\"apache2-event-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-example-certificates\", rpm:\"apache2-example-certificates~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-example-pages\", rpm:\"apache2-example-pages~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-itk\", rpm:\"apache2-itk~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-itk-debuginfo\", rpm:\"apache2-itk-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-mod_security2\", rpm:\"apache2-mod_security2~2.7.5~16.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-mod_security2-debuginfo\", rpm:\"apache2-mod_security2-debuginfo~2.7.5~16.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-mod_security2-debugsource\", rpm:\"apache2-mod_security2-debugsource~2.7.5~16.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-prefork\", rpm:\"apache2-prefork~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-prefork-debuginfo\", rpm:\"apache2-prefork-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-utils\", rpm:\"apache2-utils~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-utils-debuginfo\", rpm:\"apache2-utils-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-worker\", rpm:\"apache2-worker~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-worker-debuginfo\", rpm:\"apache2-worker-debuginfo~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"apache2-doc\", rpm:\"apache2-doc~2.2.17~80.1\", rls:\"openSUSE11.4\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2017-11-19T17:28:21", "description": "CVE ID:CVE-2013-5705\r\n\r\nModSecurity\u662f\u4e00\u4e2a\u5165\u4fb5\u4fa6\u6d4b\u4e0e\u9632\u62a4\u5f15\u64ce,\u5b83\u4e3b\u8981\u662f\u7528\u4e8eWeb\u5e94\u7528\u7a0b\u5e8f,\u6240\u4ee5\u4e5f\u88ab\u79f0\u4e3aWeb\u5e94\u7528\u7a0b\u5e8f\u9632\u706b\u5899\u3002\r\n\r\nModSecurity 2.7.6\u4e4b\u524d\u7248\u672c\u5728"modsecurity_tx_init()"\u51fd\u6570(apache2/modsecurity.c)\u7684\u5b9e\u73b0\u4e2d\u5b58\u5728\u9519\u8bef\uff0c\u6076\u610f\u7528\u6237\u901a\u8fc7\u5206\u5757\u7f16\u7801\u7684\u7279\u5236\u8bf7\u6c42\uff0c\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u7ed5\u8fc7HTTP\u8bf7\u6c42\u4e3b\u4f53\u5904\u7406\u3002\n0\nmodsecurity modsecurity < 2.7.6\n\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8bf7\u4e0b\u8f7d\u4f7f\u7528\uff1a\r\nhttp://sourceforge.net/projects/mod-security/", "published": "2014-04-02T00:00:00", "title": "ModSecurity HTTP\u8bf7\u6c42\u5206\u5757\u7f16\u7801\u5b89\u5168\u9650\u5236\u7ed5\u8fc7\u6f0f\u6d1e", "type": "seebug", "bulletinFamily": "exploit", "cvelist": ["CVE-2013-5705"], "modified": "2014-04-02T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-62035", "id": "SSV:62035", "sourceData": "", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": ""}], "securityvulns": [{"lastseen": "2018-08-31T11:10:52", "bulletinFamily": "software", "cvelist": ["CVE-2013-5705"], "description": "\r\n\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2014:081\r\n http://www.mandriva.com/en/support/security/\r\n _______________________________________________________________________\r\n\r\n Package : apache-mod_security\r\n Date : May 8, 2014\r\n Affected: Business Server 1.0, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Updated apache-mod_security packages fix security vulnerability:\r\n \r\n Martin Holst Swende discovered a flaw in the way mod_security handled\r\n chunked requests. A remote attacker could use this flaw to bypass\r\n intended mod_security restrictions, allowing them to send requests\r\n containing content that should have been removed by mod_security\r\n (CVE-2013-5705).\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705\r\n http://advisories.mageia.org/MGASA-2014-0180.html\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Enterprise Server 5:\r\n db46a0d3c58282dcfe04727dd86e2a17 mes5/i586/apache-mod_security-2.5.12-0.6mdvmes5.2.i586.rpm\r\n aca483fdd1636091ee22011f982a0ca0 mes5/i586/mlogc-2.5.12-0.6mdvmes5.2.i586.rpm \r\n 9161a3c2199d97c0280bab4e55c80b4e mes5/SRPMS/apache-mod_security-2.5.12-0.6mdvmes5.2.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n 9399f1df36d87e88bbbc9c6168f3e9d8 mes5/x86_64/apache-mod_security-2.5.12-0.6mdvmes5.2.x86_64.rpm\r\n fb3954ad17067ea1151ad39a5bb416bf mes5/x86_64/mlogc-2.5.12-0.6mdvmes5.2.x86_64.rpm \r\n 9161a3c2199d97c0280bab4e55c80b4e mes5/SRPMS/apache-mod_security-2.5.12-0.6mdvmes5.2.src.rpm\r\n\r\n Mandriva Business Server 1/X86_64:\r\n 5054d6b07b39f3388015fecb23656c36 mbs1/x86_64/apache-mod_security-2.6.3-5.4.mbs1.x86_64.rpm\r\n ffcf62b9982c5be8b222763df594de24 mbs1/x86_64/mlogc-2.6.3-5.4.mbs1.x86_64.rpm \r\n d3b3db04cacc97c7d0f14f20eeab1cda mbs1/SRPMS/apache-mod_security-2.6.3-5.4.mbs1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/en/support/security/advisories/\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.12 (GNU/Linux)\r\n\r\niD8DBQFTa2rxmqjQ0CJFipgRAv9cAKDDkwpqvpQKm/tJVJCrh1QkALEMygCgleax\r\nykAeFzQAZ3ZCzGCu3FjYMhA=\r\n=9msu\r\n-----END PGP SIGNATURE-----\r\n\r\n", "edition": 1, "modified": "2014-05-10T00:00:00", "published": "2014-05-10T00:00:00", "id": "SECURITYVULNS:DOC:30709", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:30709", "title": "[ MDVSA-2014:081 ] apache-mod_security", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:55", "bulletinFamily": "software", "cvelist": ["CVE-2013-5705"], "description": "Protection bypass via chunked encoding.", "edition": 1, "modified": "2014-05-10T00:00:00", "published": "2014-05-10T00:00:00", "id": "SECURITYVULNS:VULN:13761", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:13761", "title": "Apache mod_security protection bypass", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "debian": [{"lastseen": "2020-08-12T01:03:39", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2991-1 security@debian.org\nhttp://www.debian.org/security/ Salvatore Bonaccorso\nJuly 27, 2014 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : modsecurity-apache\nCVE ID : CVE-2013-5705\n\nMartin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten the\nWeb application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 2.6.6-6+deb7u2.\n\nFor the testing distribution (jessie), this problem has been fixed in\nversion 2.7.7-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.7.7-1.\n\nWe recommend that you upgrade your modsecurity-apache packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 7, "modified": "2014-07-27T17:54:18", "published": "2014-07-27T17:54:18", "id": "DEBIAN:DSA-2991-1:00147", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2014/msg00173.html", "title": "[SECURITY] [DSA 2991-1] modsecurity-apache security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-11-11T13:23:53", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "Package : libapache-mod-security\nVersion : 2.5.12-1+squeeze4\nCVE ID : CVE-2013-5705\n\nMartin Holst Swende discovered a flaw in the way mod_security handled \nchunked requests. A remote attacker could use this flaw to bypass \nintended mod_security restrictions, allowing them to send requests \ncontaining content that should have been removed by mod_security.\n\n\n", "edition": 11, "modified": "2014-08-09T14:01:56", "published": "2014-08-09T14:01:56", "id": "DEBIAN:DLA-34-1:B9A50", "href": "https://lists.debian.org/debian-lts-announce/2014/debian-lts-announce-201408/msg00008.html", "title": "[DLA 34-1] libapache-mod-security security update", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "amazon": [{"lastseen": "2020-11-10T12:35:55", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "**Issue Overview:**\n\napache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.\n\n \n**Affected Packages:** \n\n\nmod_security\n\n \n**Issue Correction:** \nRun _yum update mod_security_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n mlogc-2.7.3-3.23.amzn1.i686 \n mod_security-2.7.3-3.23.amzn1.i686 \n mod_security-debuginfo-2.7.3-3.23.amzn1.i686 \n \n src: \n mod_security-2.7.3-3.23.amzn1.src \n \n x86_64: \n mod_security-2.7.3-3.23.amzn1.x86_64 \n mlogc-2.7.3-3.23.amzn1.x86_64 \n mod_security-debuginfo-2.7.3-3.23.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-05-06T22:19:00", "published": "2014-05-06T22:19:00", "id": "ALAS-2014-335", "href": "https://alas.aws.amazon.com/ALAS-2014-335.html", "title": "Medium: mod_security", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-11-10T12:35:27", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "**Issue Overview:**\n\napache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header. \n\n \n**Affected Packages:** \n\n\nmod24_security\n\n \n**Issue Correction:** \nRun _yum update mod24_security_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n mod24_security-debuginfo-2.7.3-3.24.amzn1.i686 \n mod24_security-2.7.3-3.24.amzn1.i686 \n mlogc24-2.7.3-3.24.amzn1.i686 \n \n src: \n mod24_security-2.7.3-3.24.amzn1.src \n \n x86_64: \n mod24_security-2.7.3-3.24.amzn1.x86_64 \n mlogc24-2.7.3-3.24.amzn1.x86_64 \n mod24_security-debuginfo-2.7.3-3.24.amzn1.x86_64 \n \n \n", "edition": 4, "modified": "2014-05-06T22:19:00", "published": "2014-05-06T22:19:00", "id": "ALAS-2014-334", "href": "https://alas.aws.amazon.com/ALAS-2014-334.html", "title": "Medium: mod24_security", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "nessus": [{"lastseen": "2021-01-12T09:43:40", "description": "Martin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 14, "published": "2015-03-26T00:00:00", "title": "Debian DLA-34-1 : libapache-mod-security security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2015-03-26T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:6.0", "p-cpe:/a:debian:debian_linux:libapache-mod-security", "p-cpe:/a:debian:debian_linux:mod-security-common"], "id": "DEBIAN_DLA-34.NASL", "href": "https://www.tenable.com/plugins/nessus/82182", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-34-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82182);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_bugtraq_id(66552);\n\n script_name(english:\"Debian DLA-34-1 : libapache-mod-security security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Martin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2014/08/msg00008.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze-lts/libapache-mod-security\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libapache-mod-security\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:mod-security-common\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"6.0\", prefix:\"libapache-mod-security\", reference:\"2.5.12-1+squeeze4\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"mod-security-common\", reference:\"2.5.12-1+squeeze4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-07T11:54:36", "description": "Updated apache-mod_security packages fix security vulnerability :\n\nMartin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security\n(CVE-2013-5705).", "edition": 24, "published": "2014-05-09T00:00:00", "title": "Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2014:081)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2014-05-09T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:1", "p-cpe:/a:mandriva:linux:apache-mod_security", "p-cpe:/a:mandriva:linux:mlogc"], "id": "MANDRIVA_MDVSA-2014-081.NASL", "href": "https://www.tenable.com/plugins/nessus/73932", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2014:081. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73932);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_xref(name:\"MDVSA\", value:\"2014:081\");\n\n script_name(english:\"Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2014:081)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated apache-mod_security packages fix security vulnerability :\n\nMartin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security\n(CVE-2013-5705).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0180.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected apache-mod_security and / or mlogc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_security\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mlogc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/09\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"apache-mod_security-2.6.3-5.4.mbs1\")) flag++;\nif (rpm_check(release:\"MDK-MBS1\", cpu:\"x86_64\", reference:\"mlogc-2.6.3-5.4.mbs1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:12:39", "description": "Fix Chunked string case sensitive issue (CVE-2013-5705, RHBZ #1082904\n#1082905 #1082906)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-04-15T00:00:00", "title": "Fedora 19 : mod_security-2.7.5-3.fc19 (2014-4720)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2014-04-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:19", "p-cpe:/a:fedoraproject:fedora:mod_security"], "id": "FEDORA_2014-4720.NASL", "href": "https://www.tenable.com/plugins/nessus/73507", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-4720.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73507);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_bugtraq_id(66552);\n script_xref(name:\"FEDORA\", value:\"2014-4720\");\n\n script_name(english:\"Fedora 19 : mod_security-2.7.5-3.fc19 (2014-4720)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fix Chunked string case sensitive issue (CVE-2013-5705, RHBZ #1082904\n#1082905 #1082906)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1082904\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131335.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0356d5da\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mod_security package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mod_security\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:19\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^19([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 19.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC19\", reference:\"mod_security-2.7.5-3.fc19\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_security\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T10:12:39", "description": "Fix Chunked string case sensitive issue (CVE-2013-5705, RHBZ #1082904\n#1082905 #1082906)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 14, "published": "2014-04-15T00:00:00", "title": "Fedora 20 : mod_security-2.7.5-3.fc20 (2014-4633)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2014-04-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:20", "p-cpe:/a:fedoraproject:fedora:mod_security"], "id": "FEDORA_2014-4633.NASL", "href": "https://www.tenable.com/plugins/nessus/73504", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2014-4633.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(73504);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_bugtraq_id(66552);\n script_xref(name:\"FEDORA\", value:\"2014-4633\");\n\n script_name(english:\"Fedora 20 : mod_security-2.7.5-3.fc20 (2014-4633)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Fix Chunked string case sensitive issue (CVE-2013-5705, RHBZ #1082904\n#1082905 #1082906)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=1082904\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2014-April/131375.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?865ca9d5\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected mod_security package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:mod_security\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:20\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/04/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/04/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^20([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 20.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC20\", reference:\"mod_security-2.7.5-3.fc20\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_security\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T09:48:41", "description": "Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten\nthe Web application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.", "edition": 15, "published": "2014-07-28T00:00:00", "title": "Debian DSA-2991-1 : modsecurity-apache - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2014-07-28T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:modsecurity-apache", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DSA-2991.NASL", "href": "https://www.tenable.com/plugins/nessus/76858", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2991. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(76858);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_bugtraq_id(66552);\n script_xref(name:\"DSA\", value:\"2991\");\n\n script_name(english:\"Debian DSA-2991-1 : modsecurity-apache - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Martin Holst Swende discovered a flaw in the way chunked requests are\nhandled in ModSecurity, an Apache module whose purpose is to tighten\nthe Web application security. A remote attacker could use this flaw to\nbypass intended mod_security restrictions by using chunked transfer\ncoding with a capitalized Chunked value in the Transfer-Encoding HTTP\nheader, allowing to send requests containing content that should have\nbeen removed by mod_security.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/modsecurity-apache\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2014/dsa-2991\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the modsecurity-apache packages.\n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 2.6.6-6+deb7u2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:modsecurity-apache\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/07/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libapache-mod-security\", reference:\"2.6.6-6+deb7u2\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libapache2-modsecurity\", reference:\"2.6.6-6+deb7u2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T01:18:48", "description": "apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote\nattackers to bypass rules by using chunked transfer coding with a\ncapitalized Chunked value in the Transfer-Encoding HTTP header.", "edition": 23, "published": "2014-10-12T00:00:00", "title": "Amazon Linux AMI : mod_security (ALAS-2014-335)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:mod_security-debuginfo", "p-cpe:/a:amazon:linux:mlogc", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:mod_security"], "id": "ALA_ALAS-2014-335.NASL", "href": "https://www.tenable.com/plugins/nessus/78278", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-335.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78278);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_xref(name:\"ALAS\", value:\"2014-335\");\n\n script_name(english:\"Amazon Linux AMI : mod_security (ALAS-2014-335)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote\nattackers to bypass rules by using chunked transfer coding with a\ncapitalized Chunked value in the Transfer-Encoding HTTP header.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-335.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update mod_security' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mlogc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mod_security\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mod_security-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"mlogc-2.7.3-3.23.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mod_security-2.7.3-3.23.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mod_security-debuginfo-2.7.3-3.23.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mlogc / mod_security / mod_security-debuginfo\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T03:47:38", "description": "According to its banner, the version of ModSecurity installed on the\nremote host is prior to 2.7.6. It is, therefore, potentially affected\nby a filter bypass vulnerability.\n\nA filter bypass vulnerability exists with 'modsecurity.c' not properly\nhandling chunked requests. A remote attacker, with a specially crafted\nrequest, can bypass security filters and inject arbitrary content.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the version in the server's banner.", "edition": 25, "published": "2014-05-12T00:00:00", "title": "ModSecurity < 2.7.6 Chunked Header Filter Bypass", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:modsecurity:modsecurity"], "id": "MODSECURITY_2_7_6.NASL", "href": "https://www.tenable.com/plugins/nessus/73962", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(73962);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/11/15 20:50:22\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_bugtraq_id(66552);\n\n script_name(english:\"ModSecurity < 2.7.6 Chunked Header Filter Bypass\");\n script_summary(english:\"Checks version in Server response header\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web application firewall may be affected by a filter bypass\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its banner, the version of ModSecurity installed on the\nremote host is prior to 2.7.6. It is, therefore, potentially affected\nby a filter bypass vulnerability.\n\nA filter bypass vulnerability exists with 'modsecurity.c' not properly\nhandling chunked requests. A remote attacker, with a specially crafted\nrequest, can bypass security filters and inject arbitrary content.\n\nNote that Nessus has not tested for this issue but has instead relied\nonly on the version in the server's banner.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.7.6\");\n script_set_attribute(attribute:\"see_also\", value:\"http://swende.se/blog/HTTPChunked.html\");\n # https://github.com/SpiderLabs/ModSecurity/commit/f8d441cd25172fdfe5b613442fedfc0da3cc333d\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?88e6187f\");\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to ModSecurity version 2.7.6 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/09/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/12/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:modsecurity:modsecurity\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Firewalls\");\n\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"modsecurity_http_version.nasl\");\n script_require_keys(\"www/ModSecurity\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 80);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\n\nport = get_http_port(default:80);\n\n# Make sure this is ModSecurity\nget_kb_item_or_exit('www/'+port+'/modsecurity');\nversion = get_kb_item_or_exit('www/modsecurity/'+port+'/version', exit_code:1);\nbackported = get_kb_item_or_exit('www/modsecurity/'+port+'/backported', exit_code:1);\n\nif (report_paranoia < 2 && backported) audit(AUDIT_BACKPORT_SERVICE, port, \"ModSecurity\");\n\nif (version == 'unknown') audit(AUDIT_UNKNOWN_WEB_SERVER_VER, \"ModSecurity\", port);\n\nfixed_ver = '2.7.6';\nif (\n version =~ \"^[01]\\.\" ||\n version =~ \"^2\\.([0-6]|7\\.[0-5])($|[^0-9])\"\n)\n{\n if (report_verbosity > 0)\n {\n source = get_kb_item_or_exit('www/modsecurity/'+port+'/source', exit_code:1);\n\n report =\n '\\n Version source : ' + source +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_ver + '\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"ModSecurity\", port, version);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T01:18:48", "description": "apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote\nattackers to bypass rules by using chunked transfer coding with a\ncapitalized Chunked value in the Transfer-Encoding HTTP header.", "edition": 23, "published": "2014-10-12T00:00:00", "title": "Amazon Linux AMI : mod24_security (ALAS-2014-334)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:mod24_security", "p-cpe:/a:amazon:linux:mlogc24", "p-cpe:/a:amazon:linux:mod24_security-debuginfo", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2014-334.NASL", "href": "https://www.tenable.com/plugins/nessus/78277", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2014-334.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(78277);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:35\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_xref(name:\"ALAS\", value:\"2014-334\");\n\n script_name(english:\"Amazon Linux AMI : mod24_security (ALAS-2014-334)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote\nattackers to bypass rules by using chunked transfer coding with a\ncapitalized Chunked value in the Transfer-Encoding HTTP header.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2014-334.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update mod24_security' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mlogc24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mod24_security\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:mod24_security-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/05/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/10/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"mlogc24-2.7.3-3.24.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mod24_security-2.7.3-3.24.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"mod24_security-debuginfo-2.7.3-3.24.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mlogc24 / mod24_security / mod24_security-debuginfo\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-17T11:51:42", "description": "Updated apache-mod_security packages fix security vulnerability :\n\nMartin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security\n(CVE-2013-5705).", "edition": 24, "published": "2015-03-30T00:00:00", "title": "Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2015:106)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2015-03-30T00:00:00", "cpe": ["cpe:/o:mandriva:business_server:2", "p-cpe:/a:mandriva:linux:apache-mod_security", "p-cpe:/a:mandriva:linux:mlogc"], "id": "MANDRIVA_MDVSA-2015-106.NASL", "href": "https://www.tenable.com/plugins/nessus/82359", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2015:106. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(82359);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2013-5705\");\n script_xref(name:\"MDVSA\", value:\"2015:106\");\n\n script_name(english:\"Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2015:106)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated apache-mod_security packages fix security vulnerability :\n\nMartin Holst Swende discovered a flaw in the way mod_security handled\nchunked requests. A remote attacker could use this flaw to bypass\nintended mod_security restrictions, allowing them to send requests\ncontaining content that should have been removed by mod_security\n(CVE-2013-5705).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://advisories.mageia.org/MGASA-2014-0180.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected apache-mod_security and / or mlogc packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_security\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:mlogc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:business_server:2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/03/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/03/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"apache-mod_security-2.7.5-4.1.mbs2\")) flag++;\nif (rpm_check(release:\"MDK-MBS2\", cpu:\"x86_64\", reference:\"mlogc-2.7.5-4.1.mbs2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-20T12:27:51", "description": "This is apache2-mod_security2 update fixes the following security\nissue :\n\n - Specially drafted chunked http requests allow to bypass\n filters configured in mod_security2. This vulnerability\n is known as CVE-2013-5705 and was handled in bnc#871309.", "edition": 18, "published": "2014-08-21T00:00:00", "title": "openSUSE Security Update : apache2-mod_security2 (openSUSE-SU-2014:1047-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2013-5705"], "modified": "2014-08-21T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:apache2-mod_security2-debugsource", "cpe:/o:novell:opensuse:12.3", "p-cpe:/a:novell:opensuse:apache2-mod_security2-debuginfo", "p-cpe:/a:novell:opensuse:apache2-mod_security2", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2014-501.NASL", "href": "https://www.tenable.com/plugins/nessus/77290", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2014-501.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(77290);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2013-5705\");\n\n script_name(english:\"openSUSE Security Update : apache2-mod_security2 (openSUSE-SU-2014:1047-1)\");\n script_summary(english:\"Check for the openSUSE-2014-501 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This is apache2-mod_security2 update fixes the following security\nissue :\n\n - Specially drafted chunked http requests allow to bypass\n filters configured in mod_security2. This vulnerability\n is known as CVE-2013-5705 and was handled in bnc#871309.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=871309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2014-08/msg00034.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected apache2-mod_security2 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-mod_security2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-mod_security2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:apache2-mod_security2-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:12.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2014/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/08/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE12\\.3|SUSE13\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"12.3 / 13.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE12.3\", reference:\"apache2-mod_security2-2.7.5-2.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"apache2-mod_security2-debuginfo-2.7.5-2.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE12.3\", reference:\"apache2-mod_security2-debugsource-2.7.5-2.10.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"apache2-mod_security2-2.8.0-4.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"apache2-mod_security2-debuginfo-2.8.0-4.4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"apache2-mod_security2-debugsource-2.8.0-4.4.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"apache2-mod_security2 / apache2-mod_security2-debuginfo / etc\");\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "fedora": [{"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "ModSecurity is an open source intrusion detection and prevention engine for web applications. It operates embedded into the web server, acting as a powerful umbrella - shielding web applications from attacks. ", "modified": "2014-04-14T22:33:53", "published": "2014-04-14T22:33:53", "id": "FEDORA:A8947210EF", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 19 Update: mod_security-2.7.5-3.fc19", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-12-21T08:17:52", "bulletinFamily": "unix", "cvelist": ["CVE-2013-5705"], "description": "ModSecurity is an open source intrusion detection and prevention engine for web applications. It operates embedded into the web server, acting as a powerful umbrella - shielding web applications from attacks. ", "modified": "2014-04-14T22:41:25", "published": "2014-04-14T22:41:25", "id": "FEDORA:AE2BA21DCA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 20 Update: mod_security-2.7.5-3.fc20", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "suse": [{"lastseen": "2016-09-04T11:49:41", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0231", "CVE-2013-5705", "CVE-2014-0098", "CVE-2013-6438", "CVE-2014-0226"], "description": "apache2:\n - ECC support was added to mod_ssl\n - fix for a race condition in mod_status known as CVE-2014-0226 can lead\n to information disclosure; mod_status is not active by default, and is\n normally only open for connects from localhost.\n - fix for bug known as CVE-2014-0098 that can crash the apache process if\n a specially designed cookie is sent to the server (log_cookie.c)\n - fix for crash bug in mod_dav known as CVE-2013-6438\n - fix for a problem with non-responsive CGI scripts that would otherwise\n cause the server to stall and deny service. CVE-2014-0231, new\n configuration parameter CGIDScriptTimeout defaults to 60s.\n\n apache2-mod_security2:\n - specially drafted chunked http requests allow an attacker to bypass\n filters configured in mod_security2. This vulnerability is known as\n CVE-2013-5705.\n\n", "edition": 1, "modified": "2014-08-07T23:04:14", "published": "2014-08-07T23:04:14", "id": "OPENSUSE-SU-2014:0969-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00004.html", "title": "security issues addressed, most notably the mod_security heap overflow known as CVE-2014-0226 (important)", "type": "suse", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}