Lucene search

K
nessusThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO_PRIME_DCNM_6_2_1_LOCAL.NASL
HistorySep 27, 2013 - 12:00 a.m.

Cisco Prime Data Center Network Manager < 6.2(1) Multiple Vulnerabilities (credentialed check)

2013-09-2700:00:00
This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.973

Percentile

99.9%

According to its self-reported version number, the version of Cisco Prime Data Center Network Manager (DCNM) installed on the remote host is affected by multiple vulnerabilities :

  • Multiple remote command execution vulnerabilities exist in the DCNM-SAN Server component. (CVE-2013-5486)

  • An information disclosure vulnerability exists in the DCMN-SAN Server component that could allow attackers to view arbitrary files on the system. (CVE-2013-5487)

  • A XML external entity injection vulnerability exists that could allow an attacker to access arbitrary text files on the system with root privileges.
    (CVE-2013-5490)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(70167);
  script_version("1.13");
  script_cvs_date("Date: 2018/11/15 20:50:20");

  script_cve_id("CVE-2013-5486", "CVE-2013-5487", "CVE-2013-5490");
  script_bugtraq_id(62483, 62484, 62485);
  script_xref(name:"CERT", value:"632656");
  script_xref(name:"CISCO-BUG-ID", value:"CSCud80148");
  script_xref(name:"CISCO-BUG-ID", value:"CSCue77029");
  script_xref(name:"CISCO-BUG-ID", value:"CSCue77035");
  script_xref(name:"CISCO-BUG-ID", value:"CSCue77036");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20130918-dcnm");

  script_name(english:"Cisco Prime Data Center Network Manager < 6.2(1) Multiple Vulnerabilities (credentialed check)");
  script_summary(english:"Checks DCNM version number");

  script_set_attribute(attribute:"synopsis", value:
"A network management system installed on the remote host is affected
by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the version of Cisco
Prime Data Center Network Manager (DCNM) installed on the remote host
is affected by multiple vulnerabilities :

  - Multiple remote command execution vulnerabilities exist
    in the DCNM-SAN Server component. (CVE-2013-5486)

  - An information disclosure vulnerability exists in the
    DCMN-SAN Server component that could allow attackers to
    view arbitrary files on the system. (CVE-2013-5487)

  - A XML external entity injection vulnerability exists
    that could allow an attacker to access arbitrary text
    files on the system with root privileges.
    (CVE-2013-5490)");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-254/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-255/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-256/");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130918-dcnm
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?68f3586d");
  script_set_attribute(attribute:"solution", value:"Upgrade to Cisco Prime Data Center Network Manager 6.2(1) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Cisco Prime Data Center Network Manager Arbitrary File Upload');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/09/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/09/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/27");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:prime_data_center_network_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_prime_dcnm_installed_win.nasl", "cisco_prime_dcnm_installed_linux.nasl");
  script_require_ports("installed_sw/Cisco Prime DCNM");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

appname = "Cisco Prime DCNM";

get_install_count(app_name:appname, exit_if_zero:TRUE);
install = get_single_install(app_name:appname, exit_if_unknown_ver:TRUE);

ver  = install['version'];
path = install['path'];
display_ver = install['display_version'];

fix = '6.2.1.0';
display_fix = '6.2(1)';

if (ver_compare(ver:ver, fix:fix, strict:FALSE) >= 0)
  audit(AUDIT_INST_VER_NOT_VULN, appname, display_ver);

# Could be Windows or *nix
port = get_kb_item('SMB/transport');
if (!port) port = 0;

if (report_verbosity > 0)
{
  if (isnull(display_ver)) display_ver = ver;

  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + display_ver +
    '\n  Fixed version     : ' + display_fix + '\n';
  security_hole(port:port, extra:report);
}
else security_hole(port);

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.973

Percentile

99.9%