Lucene search

K
nessusThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MCAFEE_SSP_CVE-2017-3897.NASL
HistoryAug 10, 2017 - 12:00 a.m.

McAfee Security Scan Plus < 3.11.587.1 Protection Level UI Element Download MitM Command Execution (TS102714)

2017-08-1000:00:00
This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.7%

The version of McAfee Security Scan Plus installed on the remote Windows host is prior to 3.11.587.1. It is, therefore, affected by a flaw that is triggered as HTML elements for displaying the Protection Level in the UI are requested using a cleartext protocol.
This may allow a man-in-the-middle attacker to spoof server responses and execute arbitrary JavaScript code within the context of the application.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(102355);
  script_version("1.6");
  script_cvs_date("Date: 2019/11/12");

  script_cve_id("CVE-2017-3897");

  script_name(english:"McAfee Security Scan Plus < 3.11.587.1 Protection Level UI Element Download MitM Command Execution (TS102714)");
  script_summary(english:"Checks the version of McAfee Security Scan Plus.");

  script_set_attribute(attribute:"synopsis", value:
"The security application installed on the remote Windows host is
affected by a MitM command execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of McAfee Security Scan Plus installed on the remote
Windows host is prior to 3.11.587.1. It is, therefore, affected by
a flaw that is triggered as HTML elements for displaying the
Protection Level in the UI are requested using a cleartext protocol.
This may allow a man-in-the-middle attacker to spoof server responses
and execute arbitrary JavaScript code within the context of the
application.");
  # https://service.mcafee.com/webcenter/portal/oracle/webcenter/page/scopedMD/s55728c97_466d_4ddb_952d_05484ea932c6/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&articleId=TS102714&leftWidth=0%25&showFooter=false&showHeader=false&rightWidth=0%25&centerWidth=100%25
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?703213a5");
  # https://www.theregister.co.uk/2017/08/01/mcafee_online_scan_insecure/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76d6a596");
  script_set_attribute(attribute:"solution", value:
"Upgrade to McAfee Security Scan Plus version 3.11.587.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3897");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/07/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/07/04");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:security_scan_plus");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mcafee_ssp_installed.nbin");
  script_require_keys("installed_sw/McAfee Security Scan Plus");
  script_require_ports(139, 445);

  exit(0);
}

include("vcf.inc");

get_kb_item_or_exit("SMB/Registry/Enumerated");
app_info = vcf::get_app_info(app:"McAfee Security Scan Plus", win_local:TRUE);

constraints = [{ "fixed_version" : "3.11.587.1" }];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
mcafeesecurity_scan_pluscpe:/a:mcafee:security_scan_plus

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.7%

Related for MCAFEE_SSP_CVE-2017-3897.NASL