Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.ALA_ALAS-2020-1367.NASL
HistoryMay 15, 2020 - 12:00 a.m.

Amazon Linux AMI : php72 (ALAS-2020-1367)

2020-05-1500:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
127

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.6%

In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash. (CVE-2020-7064)

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server. (CVE-2020-7066)

In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
(CVE-2020-7067)

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Amazon Linux AMI Security Advisory ALAS-2020-1367.
#

include('compat.inc');

if (description)
{
  script_id(136628);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/12");

  script_cve_id("CVE-2020-7064", "CVE-2020-7066", "CVE-2020-7067");
  script_xref(name:"ALAS", value:"2020-1367");
  script_xref(name:"CEA-ID", value:"CEA-2021-0004");

  script_name(english:"Amazon Linux AMI : php72 (ALAS-2020-1367)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Amazon Linux AMI host is missing a security update.");
  script_set_attribute(attribute:"description", value:
"In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below
7.4.34, while parsing EXIF data with exif_read_data() function, it is
possible for malicious data to cause PHP to read one byte of
uninitialized memory. This could potentially lead to information
disclosure or crash. (CVE-2020-7064)

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below
7.4.4, while using get_headers() with user-supplied URL, if the URL
contains zero (\0) character, the URL will be silently truncated at
it. This may cause some software to make incorrect assumptions about
the target of the get_headers() and possibly send some information to
a wrong server. (CVE-2020-7066)

In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below
7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode()
function can be made to access locations past the allocated memory,
due to erroneously using signed numbers as array indexes.
(CVE-2020-7067)");
  script_set_attribute(attribute:"see_also", value:"https://alas.aws.amazon.com/ALAS-2020-1367.html");
  script_set_attribute(attribute:"solution", value:
"Run 'yum update php72' to update your system.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-7064");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-7067");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/01");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/05/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/15");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-bcmath");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-cli");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-common");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-dba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-dbg");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-debuginfo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-embedded");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-enchant");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-fpm");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-gd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-gmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-imap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-intl");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-json");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-ldap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-mbstring");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-mysqlnd");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-odbc");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-opcache");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-pdo");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-pdo-dblib");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-pgsql");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-process");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-pspell");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-recode");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-snmp");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-soap");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-tidy");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-xml");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:php72-xmlrpc");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Amazon Linux Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

release = get_kb_item("Host/AmazonLinux/release");
if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
os_ver = os_ver[1];
if (os_ver != "A")
{
  if (os_ver == 'A') os_ver = 'AMI';
  audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
}

if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (rpm_check(release:"ALA", reference:"php72-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-bcmath-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-cli-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-common-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-dba-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-dbg-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-debuginfo-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-devel-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-embedded-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-enchant-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-fpm-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-gd-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-gmp-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-imap-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-intl-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-json-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-ldap-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-mbstring-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-mysqlnd-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-odbc-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-opcache-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-pdo-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-pdo-dblib-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-pgsql-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-process-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-pspell-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-recode-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-snmp-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-soap-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-tidy-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-xml-7.2.30-1.22.amzn1")) flag++;
if (rpm_check(release:"ALA", reference:"php72-xmlrpc-7.2.30-1.22.amzn1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
  else security_warning(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "php72 / php72-bcmath / php72-cli / php72-common / php72-dba / etc");
}
VendorProductVersionCPE
amazonlinuxphp72p-cpe:/a:amazon:linux:php72
amazonlinuxphp72-bcmathp-cpe:/a:amazon:linux:php72-bcmath
amazonlinuxphp72-clip-cpe:/a:amazon:linux:php72-cli
amazonlinuxphp72-commonp-cpe:/a:amazon:linux:php72-common
amazonlinuxphp72-dbap-cpe:/a:amazon:linux:php72-dba
amazonlinuxphp72-dbgp-cpe:/a:amazon:linux:php72-dbg
amazonlinuxphp72-debuginfop-cpe:/a:amazon:linux:php72-debuginfo
amazonlinuxphp72-develp-cpe:/a:amazon:linux:php72-devel
amazonlinuxphp72-embeddedp-cpe:/a:amazon:linux:php72-embedded
amazonlinuxphp72-enchantp-cpe:/a:amazon:linux:php72-enchant
Rows per page:
1-10 of 331

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.012 Low

EPSS

Percentile

85.6%