code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(17736);
script_version("1.5");
script_cvs_date("Date: 2018/11/15 20:50:26");
script_cve_id("CVE-2008-2576");
script_name(english:"Oracle WebLogic ForeignJMS Component Unspecified Information Disclosure (CVE-2008-2576)");
script_summary(english:"Checks the version of Oracle WebLogic");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Oracle WebLogic Server has an unspecified information
disclosure vulnerability."
);
script_set_attribute(
attribute:"description",
value:
"According to its self-reported banner, the version of Oracle WebLogic
Server running on the remote host is affected by an unspecified local
information disclosure vulnerability in its ForeignJMS component,
which requires authentication to exploit."
);
script_set_attribute(
attribute:"see_also",
value:"https://www.oracle.com/technetwork/topics/security/2782-088912.html"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade and/or apply the appropriate patch as described in Oracle's
advisory."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P");
script_set_attribute(attribute:"vuln_publication_date", value:"2008/07/15");
script_set_attribute(attribute:"patch_publication_date", value:"2008/07/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/11/30");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:bea:weblogic_server");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:weblogic_server");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
script_dependencies("weblogic_detect.nasl");
script_require_keys("www/weblogic");
script_require_ports("Services/www", 80, 7001);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:7001);
get_kb_item_or_exit("www/weblogic/" + port + "/installed");
version = get_kb_item_or_exit("www/weblogic/" + port + "/version", exit_code:1);
service_pack = get_kb_item("www/weblogic/" + port + "/service_pack");
if (isnull(service_pack)) version_ui = version;
else version_ui = version + ' ' + service_pack;
fix = '';
if (version == "8.1" && (isnull(service_pack) || service_pack =~ "^SP[1-6]$"))
{
fix = '8.1 SP6 with #7824358';
}
else if (version == "9.0" && isnull(service_pack))
{
fix = '9.0 with #7824366';
}
else if (version == "9.1" && isnull(service_pack))
{
fix = '9.1 with CR286943';
}
else if (version == "9.2" && isnull(service_pack))
{
fix = '9.2 MP3';
}
else exit(0, "The Oracle WebLogic "+version_ui+" install listening on port "+port+" is not affected.");
cr_patch = "CR286943";
if (get_kb_item("www/weblogic/" + port + "/cr_patches/" + cr_patch))
exit(0, "The Oracle WebLogic "+version_ui+" install listening on port "+port+" is not affected since it has the patch for "+cr_patch+".");
if (report_verbosity > 0)
{
source = get_kb_item_or_exit("www/weblogic/" + port + "/source", exit_code:1);
report =
'\n Source : ' + source +
'\n Installed version : ' + version_ui +
'\n Fixed version : ' + fix +
'\n';
security_warning(port:port, extra:report);
}
else security_warning(port);
|