Lucene search

K
openvasCopyright (C) 2020 Greenbone AGOPENVAS:1361412562310144328
HistoryJul 29, 2020 - 12:00 a.m.

Cherokee Web Server 0.4.27 <= 1.2.104 DoS Vulnerability

2020-07-2900:00:00
Copyright (C) 2020 Greenbone AG
plugins.openvas.org
8

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.035

Percentile

91.6%

Cherokee Web Server is prone to a denial of service (DoS)
vulnerability.

# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:cherokee-project:cherokee";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.144328");
  script_version("2024-07-26T05:05:35+0000");
  script_tag(name:"last_modification", value:"2024-07-26 05:05:35 +0000 (Fri, 26 Jul 2024)");
  script_tag(name:"creation_date", value:"2020-07-29 06:26:54 +0000 (Wed, 29 Jul 2020)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-12-23 22:15:00 +0000 (Wed, 23 Dec 2020)");

  # nb: No "remote_banner_unreliable" as:
  # - Only a single major distro Mageia seems to have backports which can be neglected
  # - Last official release doesn't include the fix
  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"WillNotFix");

  script_cve_id("CVE-2020-12845");

  script_name("Cherokee Web Server 0.4.27 <= 1.2.104 DoS Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2020 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("gb_cherokee_http_detect.nasl");
  script_mandatory_keys("cherokee/detected");

  script_tag(name:"summary", value:"Cherokee Web Server is prone to a denial of service (DoS)
  vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Cherokee is affected by a DoS due to NULL pointer dereferences.

  A remote unauthenticated attacker can crash the server by sending an HTTP request to protected
  resources using a malformed Authorization header that is mishandled during a cherokee_buffer_add
  call within cherokee_validator_parse_basic or cherokee_validator_parse_digest.");

  script_tag(name:"impact", value:"An unauthenticated attacker may crash the server.");

  script_tag(name:"affected", value:"Cherokee Web Server through versions 0.4.27 to 1.2.104.");

  script_tag(name:"solution", value:"No known solution was made available for at least one year
  since the disclosure of this vulnerability. Likely none will be provided anymore. General solution
  options are to upgrade to a newer release, disable respective features, remove the product or
  replace the product by another one.

  Possible mitigations:

  - Extract the source code patch from the referenced GitHub pull request and rebuild the software
  with the patch applied

  - Rebuild the software from the 'master' development branch available in the GitHub repository

  Notes:

  - Last 'official' release 1.2.104 was done by the vendor in 2014 (see Git commit
  1824487b7af0724ae42ef564b82b106c65fc0b31) and doesn't include the fix for this vulnerability

  - Please create an override for this result if only the source code patch has been applied, the
  product was build from the development branch or if the target host is running Mageia");

  script_xref(name:"URL", value:"https://github.com/cherokee/webserver/issues/1242");
  script_xref(name:"URL", value:"https://github.com/cherokee/webserver/pull/1243");
  script_xref(name:"URL", value:"https://github.com/cherokee/webserver/commit/1824487b7af0724ae42ef564b82b106c65fc0b31");
  script_xref(name:"URL", value:"https://github.com/cherokee/webserver/issues/1269");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range(version: version, test_version: "0.4.27", test_version2: "1.2.104")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "None, see solution tag for a possible workaround", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(0);

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.035

Percentile

91.6%