CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
5.1%
According to its self-reported version, the IBM MQ server installed on the remote host is 9.1.x prior to 9.2 CD, or 9.1.0.x prior to 9.1.0.6 LTS, and is therefore affected by an information disclosure vulnerability due to the inclusion of sensitive information in trace files. An unauthenticated, local attacker could exploit this vulnerability, by accessing the trace files, to acquire potentially sensitive information.
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(139237);
script_version("1.3");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/07/16");
script_cve_id("CVE-2020-4498");
script_xref(name:"IAVA", value:"2020-A-0345-S");
script_name(english:"IBM MQ 9.1.x < 9.2 CD / 9.1.0.x < 9.1.0.6 LTS Information Disclosure");
script_set_attribute(attribute:"synopsis", value:
"A message queuing service installed on the remote host is affected by an information disclosure vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the IBM MQ server installed on the remote host is 9.1.x prior to 9.2 CD, or
9.1.0.x prior to 9.1.0.6 LTS, and is therefore affected by an information disclosure vulnerability due to the inclusion
of sensitive information in trace files. An unauthenticated, local attacker could exploit this vulnerability, by
accessing the trace files, to acquire potentially sensitive information.");
script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/pages/node/6252409");
script_set_attribute(attribute:"solution", value:
"Upgrade to IBM MQ 9.2 CD, 9.1.0.6 LTS or later as per the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-4498");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/07/23");
script_set_attribute(attribute:"patch_publication_date", value:"2020/07/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/07/31");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_mq");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("websphere_mq_installed.nasl");
script_require_keys("installed_sw/IBM WebSphere MQ");
exit(0);
}
include('install_func.inc');
app_name = 'IBM WebSphere MQ';
install = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);
version = install['version'];
path = install['path'];
fix = NULL;
# 9.1.x < 9.1.0.6 LTS
if (version =~ "^9\.1\.0\.")
{
fix = '9.1.0.6';
}
# 9.1.x < 9.2 CD
else if (version =~ "^9\.1($|\.)")
{
fix = '9.2';
}
else
audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);
if (ver_compare(ver:version, fix:fix, strict:FALSE) == -1)
{
port = get_kb_item('SMB/transport');
if (!port) port = 445;
report =
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix +
'\n';
security_report_v4(port:port, extra:report, severity:SECURITY_NOTE);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
5.1%