Lucene search

K
nessusThis script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-CUCM-SELFCARE-DRASC7SR.NASL
HistoryAug 14, 2020 - 12:00 a.m.

Cisco Unified Communications Manager Cross-Site Scripting (cisco-sa-cucm-selfcare-drASc7sr)

2020-08-1400:00:00
This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

51.5%

According to its self-reported version, Cisco Unified Communications Manager is affected by a Cross-Site Scripting vulnerability that could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#TRUSTED 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
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(139605);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2020-3346");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvt01170");
  script_xref(name:"CISCO-SA", value:"cisco-sa-cucm-selfcare-drASc7sr");
  script_xref(name:"IAVA", value:"2020-A-0297-S");

  script_name(english:"Cisco Unified Communications Manager Cross-Site Scripting (cisco-sa-cucm-selfcare-drASc7sr)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Unified Communications Manager is affected by a Cross-Site Scripting
vulnerability that could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack
against a user of the interface. The vulnerability is due to insufficient protection of user-supplied input by the
web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a
user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary
script code in the context of the affected interface or access sensitive browser-based information.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-selfcare-drASc7sr
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?80d8846d");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt01170");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvt01170");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3346");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_cwe_id(79);

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/08/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/08/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/08/14");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:unified_communications_manager");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ucm_detect.nbin");
  script_require_keys("Host/Cisco/CUCM/Version", "Host/Cisco/CUCM/Version_Display");

  exit(0);
}

include('ccf.inc');

product_info = cisco::get_product_info(name:'Cisco Unified Communications Manager');

# At the time of publication, this vulnerability affected all 10.5(2), 11.5(1), 12.0(1), and 12.5(1) 
# releases of Cisco Unified CM and Cisco Unified CM SME software. The Bug ID only mentions affected
# versions 12.5(1.10000.22) and 12.5(1.11900.146).

vuln_ranges = [
  { 'min_ver' : '10.5',  'fix_ver' : '11.0' },
  { 'min_ver' : '11.5',  'fix_ver' : '12.0' },
  { 'min_ver' : '12.0',  'fix_ver' : '12.5' },
  { 'min_ver' : '12.5',  'fix_ver' : '12.6' }
];

reporting = make_array(
  'port', 0,
  'severity', SECURITY_WARNING,
  'version', product_info['display_version'],
  'bug_id', 'CSCvt01170',
  'fix', 'No known fix, refer to Cisco advisory',
  'disable_caveat', TRUE
);

cisco::check_and_report(
  product_info:product_info,
  reporting:reporting,
  vuln_ranges:vuln_ranges
);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

51.5%

Related for CISCO-SA-CUCM-SELFCARE-DRASC7SR.NASL