Vulnerabilities > CVE-2012-6153 - Improper Input Validation vulnerability in Apache Commons-Httpclient

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
apache
CWE-20
nessus

Summary

http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2014-170.NASL
    descriptionUpdated jakarta-commons-httpclient and httpcomponents-client packages fix security vulnerability : The Jakarta Commons HttpClient and Apache httpcomponents HttpClient components may be susceptible to a
    last seen2020-06-01
    modified2020-06-02
    plugin id77649
    published2014-09-12
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77649
    titleMandriva Linux Security Advisory : jakarta-commons-httpclient (MDVSA-2014:170)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2014:170. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77649);
      script_version("1.4");
      script_cvs_date("Date: 2019/08/02 13:32:56");
    
      script_cve_id("CVE-2012-6153");
      script_bugtraq_id(69258);
      script_xref(name:"MDVSA", value:"2014:170");
    
      script_name(english:"Mandriva Linux Security Advisory : jakarta-commons-httpclient (MDVSA-2014:170)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated jakarta-commons-httpclient and httpcomponents-client packages
    fix security vulnerability :
    
    The Jakarta Commons HttpClient and Apache httpcomponents HttpClient
    components may be susceptible to a 'Man in the Middle Attack' due to a
    flaw in the default hostname verification during SSL/TLS when a
    specially crafted server side certificate is used (CVE-2012-6153)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://advisories.mageia.org/MGASA-2014-0347.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:httpcomponents-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:httpcomponents-client-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:jakarta-commons-httpclient-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:jakarta-commons-httpclient-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:jakarta-commons-httpclient-manual");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/09/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/09/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK-MBS1", reference:"httpcomponents-client-4.2.5-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", reference:"httpcomponents-client-javadoc-4.2.5-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", reference:"jakarta-commons-httpclient-3.1-8.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", reference:"jakarta-commons-httpclient-demo-3.1-8.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", reference:"jakarta-commons-httpclient-javadoc-3.1-8.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", reference:"jakarta-commons-httpclient-manual-3.1-8.1.mbs1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1833.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Web Platform is a platform for Java applications, which integrates the JBoss Web Server with JBoss Hibernate and JBoss Seam. It was discovered that the HttpClient incorrectly extracted host name from an X.509 certificate subject
    last seen2020-06-01
    modified2020-06-02
    plugin id79204
    published2014-11-12
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79204
    titleRHEL 5 / 6 : JBoss EWP (RHSA-2014:1833)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:1833. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79204);
      script_version("1.12");
      script_cvs_date("Date: 2019/10/24 15:35:39");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_xref(name:"RHSA", value:"2014:1833");
    
      script_name(english:"RHEL 5 / 6 : JBoss EWP (RHSA-2014:1833)");
      script_summary(english:"Checks the rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that
    fix two security issues are now available for Red Hat Enterprise Linux
    4, 5, and 6.
    
    Red Hat Product Security has rated this update as having Important
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Red Hat JBoss Enterprise Web Platform is a platform for Java
    applications, which integrates the JBoss Web Server with JBoss
    Hibernate and JBoss Seam.
    
    It was discovered that the HttpClient incorrectly extracted host name
    from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153,
    CVE-2014-3577)
    
    The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat
    Product Security.
    
    For additional information on these flaws, refer to the Knowledgebase
    article in the References section.
    
    All users of Red Hat JBoss Enterprise Web Platform 5.2.0 on Red Hat
    Enterprise Linux 4, 5, and 6 are advised to upgrade to these updated
    packages. The JBoss server process must be restarted for the update to
    take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/solutions/1165533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:1833"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3577"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected apache-cxf package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/11/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:1833";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL5", rpm:"jbossas-seam2-") || rpm_exists(release:"RHEL6", rpm:"jbossas-seam2-")) || rpm_exists(rpm:"jbossas-welcome-content-eap")) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EWP");
    
      if (rpm_check(release:"RHEL5", reference:"apache-cxf-2.2.12-14.patch_09.ep5.el5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"apache-cxf-2.2.12-14.patch_09.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf");
      }
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9617.NASL
    descriptionSecurity fix for CVE-2014-3577 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-30
    plugin id77444
    published2014-08-30
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77444
    titleFedora 20 : httpcomponents-client-4.2.5-4.fc20 (2014-9617)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-9617.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77444);
      script_version("1.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_bugtraq_id(69257, 69258);
      script_xref(name:"FEDORA", value:"2014-9617");
    
      script_name(english:"Fedora 20 : httpcomponents-client-4.2.5-4.fc20 (2014-9617)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security fix for CVE-2014-3577
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1129074"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-August/137180.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?a00de90f"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected httpcomponents-client package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:httpcomponents-client");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/30");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"httpcomponents-client-4.2.5-4.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpcomponents-client");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2769-1.NASL
    descriptionIt was discovered that Apache Commons HttpClient did not properly verify the Common Name or subjectAltName fields of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-5783) Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. (CVE-2012-6153) Subodh Iyengar and Will Shackleton discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2014-3577) It was discovered that Apache Commons HttpClient did not properly handle read timeouts during HTTPS handshakes. A remote attacker could trigger this flaw to cause a denial of service. (CVE-2015-5262). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id86401
    published2015-10-15
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86401
    titleUbuntu 12.04 LTS / 14.04 LTS / 15.04 : commons-httpclient vulnerabilities (USN-2769-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-2769-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86401);
      script_version("2.6");
      script_cvs_date("Date: 2019/09/18 12:31:45");
    
      script_cve_id("CVE-2012-5783", "CVE-2012-6153", "CVE-2014-3577", "CVE-2015-5262");
      script_xref(name:"USN", value:"2769-1");
    
      script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS / 15.04 : commons-httpclient vulnerabilities (USN-2769-1)");
      script_summary(english:"Checks dpkg output for updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Ubuntu host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that Apache Commons HttpClient did not properly
    verify the Common Name or subjectAltName fields of X.509 certificates.
    An attacker could exploit this to perform a man in the middle attack
    to view sensitive information or alter encrypted communications. This
    issue only affected Ubuntu 12.04 LTS. (CVE-2012-5783)
    
    Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for
    Apache Commons HttpClient. An attacker could exploit this to perform a
    man in the middle attack to view sensitive information or alter
    encrypted communications. This issue only affected Ubuntu 12.04 LTS.
    (CVE-2012-6153)
    
    Subodh Iyengar and Will Shackleton discovered the fix for
    CVE-2012-5783 was incomplete for Apache Commons HttpClient. An
    attacker could exploit this to perform a man in the middle attack to
    view sensitive information or alter encrypted communications.
    (CVE-2014-3577)
    
    It was discovered that Apache Commons HttpClient did not properly
    handle read timeouts during HTTPS handshakes. A remote attacker could
    trigger this flaw to cause a denial of service. (CVE-2015-5262).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/2769-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libcommons-httpclient-java package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcommons-httpclient-java");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:15.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/11/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/10/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/15");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|14\.04|15\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04 / 15.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libcommons-httpclient-java", pkgver:"3.1-10ubuntu0.1")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"libcommons-httpclient-java", pkgver:"3.1-10.2ubuntu0.14.04.1")) flag++;
    if (ubuntu_check(osver:"15.04", pkgname:"libcommons-httpclient-java", pkgver:"3.1-10.2ubuntu0.15.04.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libcommons-httpclient-java");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-222.NASL
    descriptionCVE-2012-5783 and CVE-2012-6153 Apache Commons HttpClient 3.1 did not verify that the server hostname matches a domain name in the subject
    last seen2020-03-17
    modified2015-05-20
    plugin id83545
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83545
    titleDebian DLA-222-1 : commons-httpclient security update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-222-1. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83545);
      script_version("2.7");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2012-5783", "CVE-2012-6153", "CVE-2014-3577");
      script_bugtraq_id(58073, 69257, 69258);
    
      script_name(english:"Debian DLA-222-1 : commons-httpclient security update");
      script_summary(english:"Checks dpkg output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "CVE-2012-5783 and CVE-2012-6153 Apache Commons HttpClient 3.1 did not
    verify that the server hostname matches a domain name in the subject's
    Common Name (CN) or subjectAltName field of the X.509 certificate,
    which allows man-in-the-middle attackers to spoof SSL servers via an
    arbitrary valid certificate. Thanks to Alberto Fernandez Martinez for
    the patch.
    
    CVE-2014-3577 It was found that the fix for CVE-2012-6153 was
    incomplete: the code added to check that the server hostname matches
    the domain name in a subject's Common Name (CN) field in X.509
    certificates was flawed. A man-in-the-middle attacker could use this
    flaw to spoof an SSL server using a specially crafted X.509
    certificate. The fix for CVE-2012-6153 was intended to address the
    incomplete patch for CVE-2012-5783. The issue is now completely
    resolved by applying this patch and the one for the previous CVEs
    
    This upload was prepared by Markus Koschany.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2015/05/msg00008.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/squeeze-lts/commons-httpclient"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libcommons-httpclient-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libcommons-httpclient-java-doc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/05/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/20");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"6.0", prefix:"libcommons-httpclient-java", reference:"3.1-9+deb6u1")) flag++;
    if (deb_check(release:"6.0", prefix:"libcommons-httpclient-java-doc", reference:"3.1-9+deb6u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1098.NASL
    descriptionUpdated devtoolset-2-httpcomponents-client packages that fix one security issue are now available for Red Hat Developer Toolset 2. Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on httpcomponents HttpCore. It was discovered that the HttpClient incorrectly extracted host name from an X.509 certificate subject
    last seen2020-06-01
    modified2020-06-02
    plugin id79042
    published2014-11-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79042
    titleRHEL 6 : devtoolset-2-httpcomponents-client (RHSA-2014:1098)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:1098. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79042);
      script_version("1.12");
      script_cvs_date("Date: 2019/10/24 15:35:38");
    
      script_cve_id("CVE-2012-6153");
      script_bugtraq_id(69257);
      script_xref(name:"RHSA", value:"2014:1098");
    
      script_name(english:"RHEL 6 : devtoolset-2-httpcomponents-client (RHSA-2014:1098)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated devtoolset-2-httpcomponents-client packages that fix one
    security issue are now available for Red Hat Developer Toolset 2.
    
    Red Hat Product Security has rated this update as having Important
    security impact. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available from the
    CVE link in the References section.
    
    HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on
    httpcomponents HttpCore.
    
    It was discovered that the HttpClient incorrectly extracted host name
    from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153)
    
    This issue was discovered by Florian Weimer of Red Hat Product
    Security.
    
    For additional information on this flaw, refer to the Knowledgebase
    article in the References section.
    
    All devtoolset-2-httpcomponents-client users are advised to upgrade to
    these updated packages, which contain a backported patch to correct
    this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/solutions/1165533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:1098"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected devtoolset-2-httpcomponents-client and / or
    devtoolset-2-httpcomponents-client-javadoc packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:devtoolset-2-httpcomponents-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:devtoolset-2-httpcomponents-client-javadoc");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/09/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/08");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:1098";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL6", reference:"devtoolset-2-httpcomponents-client-4.2.1-6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"devtoolset-2-httpcomponents-client-javadoc-4.2.1-6.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "devtoolset-2-httpcomponents-client / etc");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1320.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Web Platform is a platform for Java applications, which integrates the JBoss Web Server with JBoss Hibernate and JBoss Seam. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78007
    published2014-10-01
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78007
    titleRHEL 4 / 5 / 6 : JBoss EWP (RHSA-2014:1320)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:1320. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(78007);
      script_version("1.16");
      script_cvs_date("Date: 2019/10/24 15:35:38");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_xref(name:"RHSA", value:"2014:1320");
    
      script_name(english:"RHEL 4 / 5 / 6 : JBoss EWP (RHSA-2014:1320)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that
    fix two security issues are now available for Red Hat Enterprise Linux
    4, 5, and 6.
    
    Red Hat Product Security has rated this update as having Important
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Red Hat JBoss Enterprise Web Platform is a platform for Java
    applications, which integrates the JBoss Web Server with JBoss
    Hibernate and JBoss Seam.
    
    It was found that the fix for CVE-2012-5783 was incomplete: the code
    added to check that the server host name matches the domain name in a
    subject's Common Name (CN) field in X.509 certificates was flawed. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153)
    
    It was discovered that the HttpClient incorrectly extracted host name
    from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2014-3577)
    
    The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat
    Product Security.
    
    For additional information on these flaws, refer to the Knowledgebase
    article in the References section.
    
    All users of Red Hat JBoss Enterprise Web Platform 5.2.0 on Red Hat
    Enterprise Linux 4, 5, and 6 are advised to upgrade to these updated
    packages. The JBoss server process must be restarted for the update to
    take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/solutions/1165533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:1320"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3577"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-docs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-examples");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-runtime");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/09/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(4|5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:1320";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL4", rpm:"jbossas-seam2-") || rpm_exists(release:"RHEL5", rpm:"jbossas-seam2-") || rpm_exists(release:"RHEL6", rpm:"jbossas-seam2-")) || rpm_exists(rpm:"jbossas-welcome-content-eap")) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EWP");
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL4") && rpm_check(release:"RHEL4", reference:"jakarta-commons-httpclient-3.1-4_patch_02.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL5") && rpm_check(release:"RHEL5", reference:"jakarta-commons-httpclient-3.1-4_patch_02.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL6") && rpm_check(release:"RHEL6", reference:"jakarta-commons-httpclient-3.1-4_patch_02.el6_5")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jakarta-commons-httpclient / jboss-seam2 / jboss-seam2-docs / etc");
      }
    }
    
  • NASL familyCGI abuses
    NASL idWEBSPHERE_PORTAL_8_0_0_1_CF15.NASL
    descriptionThe version of IBM WebSphere Portal installed on the remote host is 8.0.0.x prior to 8.0.0.1 CF15. It is, therefore, affected by multiple vulnerabilities : - A flaw exists in
    last seen2020-06-01
    modified2020-06-02
    plugin id82850
    published2015-04-17
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82850
    titleIBM WebSphere Portal 8.0.0.x < 8.0.0.1 CF15 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82850);
      script_version("1.3");
      script_cvs_date("Date: 2018/08/06 14:03:14");
    
      script_cve_id(
        "CVE-2012-6153",
        "CVE-2014-3577",
        "CVE-2014-4808",
        "CVE-2014-4814",
        "CVE-2014-4821",
        "CVE-2014-5191",
        "CVE-2014-6171",
        "CVE-2014-6193",
        "CVE-2014-8902"
      );
      script_bugtraq_id(
        69161,
        69257,
        69258,
        70755,
        70757,
        70758
      );
    
      script_name(english:"IBM WebSphere Portal 8.0.0.x < 8.0.0.1 CF15 Multiple Vulnerabilities");
      script_summary(english:"Checks for the installed patch.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host has web portal software installed that is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of IBM WebSphere Portal installed on the remote host is
    8.0.0.x prior to 8.0.0.1 CF15. It is, therefore, affected by multiple
    vulnerabilities :
    
      - A flaw exists in 'Apache Commons HttpClient' that allows
        a man-in-the-middle attacker to spoof SSL servers via a
        certificate with a subject that specifies a common name
        in a field that is not the CN field. (CVE-2012-6153)
    
      - A flaw exists in 'Apache HttpComponents' that allows a
        man-in-the-middle attacker to spoof SSL servers via a
        certificate with a subject that specifies a common name
        in a field that is not the CN field. (CVE-2014-3577)
    
      - An unspecified vulnerability exists that allows an
        authenticated attacker to execute arbitrary code on the
        system. (CVE-2014-4808)
    
      - A flaw exists due to improper recursion detection during
        entity expansion. A remote attacker, via a specially
        crafted XML document, can cause the system to crash,
        resulting in a denial of service. (CVE-2014-4814)
    
      - An information disclosure vulnerability exists that
        allows a remote attacker to identify whether or not a
        file exists based on the web server error codes.
        (CVE-2014-4821)
    
      - A cross-site scripting vulnerability exists in the
        'Preview' plugin in CKEditor, which allows a remote
        attacker to inject arbitrary data via unspecified
        vectors. (CVE-2014-5191)
    
      - A cross-site scripting vulnerability exists that allows
        an attacker to inject arbitrary web script or HTML via a
        specially crafted URL. (CVE-2014-6171)
    
      - A flaw exists when the Managed Pages setting is enabled
        that allows a remote, authenticated attacker to write to
        pages via an XML injection attack. (CVE-2014-6193)
    
      - A cross-site scripting vulnerability exists in the Blog
        Portlet, which allows an attacker to inject arbitrary
        data via a specially crafted URL. (CVE-2014-8902)");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24034497#WP15");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to IBM WebSphere Portal 8.0.0.1 Cumulative Fix 15 (CF15) or
    later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/09/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/02/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/17");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_portal");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"CGI abuses");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("websphere_portal_installed.nbin");
      script_require_keys("installed_sw/IBM WebSphere Portal");
    
      exit(0);
    }
    
    include("websphere_portal_version.inc");
    
    websphere_portal_check_version(
      ranges:make_list("8.0.0.0, 8.0.0.1"),
      fix:"CF15",
      severity:SECURITY_WARNING,
      xss:TRUE
    );
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_AC18046C9B0811E68011005056925DB4.NASL
    descriptionApache Axis2 reports : Apache Axis2 1.7.4 is a maintenance release that includes fixes for several issues, including the following security issues : Session fixation (AXIS2-4739) and XSS (AXIS2-5683) vulnerabilities affecting the admin console. A dependency on an Apache HttpClient version affected by known security vulnerabilities (CVE-2012-6153 and CVE-2014-3577); see AXIS2-5757.
    last seen2020-06-01
    modified2020-06-02
    plugin id94419
    published2016-10-31
    reporterThis script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/94419
    titleFreeBSD : Axis2 -- Security vulnerabilities on dependency Apache HttpClient (ac18046c-9b08-11e6-8011-005056925db4)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(94419);
      script_version("2.2");
      script_cvs_date("Date: 2018/11/10 11:49:45");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
    
      script_name(english:"FreeBSD : Axis2 -- Security vulnerabilities on dependency Apache HttpClient (ac18046c-9b08-11e6-8011-005056925db4)");
      script_summary(english:"Checks for updated package in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote FreeBSD host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Apache Axis2 reports :
    
    Apache Axis2 1.7.4 is a maintenance release that includes fixes for
    several issues, including the following security issues : Session
    fixation (AXIS2-4739) and XSS (AXIS2-5683) vulnerabilities affecting
    the admin console. A dependency on an Apache HttpClient version
    affected by known security vulnerabilities (CVE-2012-6153 and
    CVE-2014-3577); see AXIS2-5757."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://axis.apache.org/axis2/java/core/release-notes/1.7.4.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://issues.apache.org/jira/browse/AXIS2-4739"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://issues.apache.org/jira/browse/AXIS2-5683"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://issues.apache.org/jira/browse/AXIS2-5757"
      );
      # https://vuxml.freebsd.org/freebsd/ac18046c-9b08-11e6-8011-005056925db4.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c426e985"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:axis2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/12/06");
      script_set_attribute(attribute:"patch_publication_date", value:"2016/10/28");
      script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/31");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"axis2<1.7.4")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-2019.NASL
    descriptionUpdated Red Hat JBoss Enterprise Application Platform 6.3.2 packages that fix three security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that the Apache CXF incorrectly extracted the host name from an X.509 certificate subject
    last seen2020-06-01
    modified2020-06-02
    plugin id80159
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80159
    titleRHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:2019)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:2019. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80159);
      script_version("1.13");
      script_cvs_date("Date: 2019/10/24 15:35:39");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577", "CVE-2014-3623");
      script_xref(name:"RHSA", value:"2014:2019");
    
      script_name(english:"RHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:2019)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated Red Hat JBoss Enterprise Application Platform 6.3.2 packages
    that fix three security issues are now available for Red Hat
    Enterprise Linux 5, 6, and 7.
    
    Red Hat Product Security has rated this update as having Important
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
    applications based on JBoss Application Server 7.
    
    It was discovered that the Apache CXF incorrectly extracted the host
    name from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153,
    CVE-2014-3577)
    
    It was found that Apache WSS4J (Web Services Security for Java), as
    used by Apache CXF with the TransportBinding, did not, by default,
    properly enforce all security requirements associated with SAML
    SubjectConfirmation methods. A remote attacker could use this flaw to
    perform various types of spoofing attacks on web service endpoints
    secured by WSS4j that rely on SAML for authentication. (CVE-2014-3623)
    
    The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat
    Product Security.
    
    All users of Red Hat JBoss Enterprise Application Platform 6.3.2 on
    Red Hat Enterprise Linux 5, 6, and 7 are advised to upgrade to these
    updated packages. The JBoss server process must be restarted for the
    update to take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:2019"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3577"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3623"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected apache-cxf and / or wss4j packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:wss4j");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/12/18");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6|7)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x / 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:2019";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL5", rpm:"jbossas-welcome-content-eap") || rpm_exists(release:"RHEL6", rpm:"jbossas-welcome-content-eap") || rpm_exists(release:"RHEL7", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL5", reference:"apache-cxf-2.7.12-1.SP1_redhat_5.1.ep6.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"wss4j-1.6.16-2.redhat_3.1.ep6.el5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"apache-cxf-2.7.12-1.SP1_redhat_5.1.ep6.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"wss4j-1.6.16-2.redhat_3.1.ep6.el6")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"apache-cxf-2.7.12-1.SP1_redhat_5.1.ep6.el7")) flag++;
      if (rpm_check(release:"RHEL7", reference:"wss4j-1.6.16-2.redhat_3.1.ep6.el7")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf / wss4j");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1321.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Application Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78008
    published2014-10-01
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/78008
    titleRHEL 4 / 5 / 6 : JBoss EAP (RHSA-2014:1321)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:1321. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(78008);
      script_version("1.15");
      script_cvs_date("Date: 2019/10/24 15:35:38");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_xref(name:"RHSA", value:"2014:1321");
    
      script_name(english:"RHEL 4 / 5 / 6 : JBoss EAP (RHSA-2014:1321)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated packages for Red Hat JBoss Enterprise Application Platform
    5.2.0 that fix two security issues are now available for Red Hat
    Enterprise Linux 4, 5, and 6.
    
    Red Hat Product Security has rated this update as having Important
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Red Hat JBoss Enterprise Application Platform is a platform for Java
    applications, which integrates the JBoss Application Server with JBoss
    Hibernate and JBoss Seam.
    
    It was found that the fix for CVE-2012-5783 was incomplete: the code
    added to check that the server host name matches the domain name in a
    subject's Common Name (CN) field in X.509 certificates was flawed. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153)
    
    It was discovered that the HttpClient incorrectly extracted host name
    from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2014-3577)
    
    The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat
    Product Security.
    
    For additional information on these flaws, refer to the Knowledgebase
    article in the References section.
    
    All users of Red Hat JBoss Enterprise Application Platform 5.2.0 on
    Red Hat Enterprise Linux 4, 5, and 6 are advised to upgrade to these
    updated packages. The JBoss server process must be restarted for the
    update to take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/solutions/1165533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:1321"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3577"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-docs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-examples");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:jboss-seam2-runtime");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/09/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/01");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(4|5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:1321";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL4", rpm:"jbossas-welcome-content-eap") || rpm_exists(release:"RHEL5", rpm:"jbossas-welcome-content-eap") || rpm_exists(release:"RHEL6", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL4") && rpm_check(release:"RHEL4", reference:"jakarta-commons-httpclient-3.1-4_patch_02.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
      if (rpm_check(release:"RHEL4", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.ep5.el4")) flag++;
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL5") && rpm_check(release:"RHEL5", reference:"jakarta-commons-httpclient-3.1-4_patch_02.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
      if (rpm_check(release:"RHEL5", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.ep5.el5")) flag++;
    
      if (rpm_exists(rpm:"jakarta-commons-httpclient-3.1-4", release:"RHEL6") && rpm_check(release:"RHEL6", reference:"jakarta-commons-httpclient-3.1-4_patch_02.el6_5")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-docs-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-examples-2.2.6.EAP5-22_patch_01.el6")) flag++;
      if (rpm_check(release:"RHEL6", reference:"jboss-seam2-runtime-2.2.6.EAP5-22_patch_01.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jakarta-commons-httpclient / jboss-seam2 / jboss-seam2-docs / etc");
      }
    }
    
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2014-410.NASL
    descriptionApache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject
    last seen2020-06-01
    modified2020-06-02
    plugin id78353
    published2014-10-12
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/78353
    titleAmazon Linux AMI : jakarta-commons-httpclient (ALAS-2014-410)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Amazon Linux AMI Security Advisory ALAS-2014-410.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(78353);
      script_version("1.3");
      script_cvs_date("Date: 2018/04/18 15:09:35");
    
      script_cve_id("CVE-2012-5783", "CVE-2012-6153", "CVE-2014-3577");
      script_xref(name:"ALAS", value:"2014-410");
    
      script_name(english:"Amazon Linux AMI : jakarta-commons-httpclient (ALAS-2014-410)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Amazon Linux AMI host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments
    Service (FPS) merchant Java SDK and other products, does not verify
    that the server hostname matches a domain name in the subject's Common
    Name (CN) or subjectAltName field of the X.509 certificate, which
    allows man-in-the-middle attackers to spoof SSL servers via an
    arbitrary valid certificate.
    
    It was found that the fix for CVE-2012-6153 was incomplete: the code
    added to check that the server hostname matches the domain name in a
    subject's Common Name (CN) field in X.509 certificates was flawed. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate.
    
    It was found that the fix for CVE-2012-5783 was incomplete: the code
    added to check that the server host name matches the domain name in a
    subject's Common Name (CN) field in X.509 certificates was flawed. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://alas.aws.amazon.com/ALAS-2014-410.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Run 'yum update jakarta-commons-httpclient' to update your system."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:jakarta-commons-httpclient-demo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:jakarta-commons-httpclient-javadoc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:jakarta-commons-httpclient-manual");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/09/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
      script_family(english:"Amazon Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/AmazonLinux/release");
    if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
    os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
    os_ver = os_ver[1];
    if (os_ver != "A")
    {
      if (os_ver == 'A') os_ver = 'AMI';
      audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
    }
    
    if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (rpm_check(release:"ALA", reference:"jakarta-commons-httpclient-3.1-15.8.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"jakarta-commons-httpclient-demo-3.1-15.8.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"jakarta-commons-httpclient-javadoc-3.1-15.8.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"jakarta-commons-httpclient-manual-3.1-15.8.amzn1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jakarta-commons-httpclient / jakarta-commons-httpclient-demo / etc");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9581.NASL
    descriptionSecurity fix for CVE-2014-3577, CVE-2012-6153 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-27
    plugin id77399
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77399
    titleFedora 20 : jakarta-commons-httpclient-3.1-15.fc20 (2014-9581)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-9581.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77399);
      script_version("1.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2012-5783", "CVE-2012-6153", "CVE-2014-3577");
      script_bugtraq_id(58073, 69257, 69258);
      script_xref(name:"FEDORA", value:"2014-9581");
    
      script_name(english:"Fedora 20 : jakarta-commons-httpclient-3.1-15.fc20 (2014-9581)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security fix for CVE-2014-3577, CVE-2012-6153
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1129074"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1129916"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-August/137032.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0b64edb4"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected jakarta-commons-httpclient package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:jakarta-commons-httpclient");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:20");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^20([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 20.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC20", reference:"jakarta-commons-httpclient-3.1-15.fc20")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "jakarta-commons-httpclient");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9629.NASL
    descriptionSecurity fix for CVE-2014-3577 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-30
    plugin id77445
    published2014-08-30
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77445
    titleFedora 19 : httpcomponents-client-4.2.5-4.fc19 (2014-9629)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2014-9629.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77445);
      script_version("1.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_bugtraq_id(69257, 69258);
      script_xref(name:"FEDORA", value:"2014-9629");
    
      script_name(english:"Fedora 19 : httpcomponents-client-4.2.5-4.fc19 (2014-9629)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Security fix for CVE-2014-3577
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1129074"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2014-August/137174.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?8c63b231"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected httpcomponents-client package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:httpcomponents-client");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:19");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/30");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^19([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 19.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC19", reference:"httpcomponents-client-4.2.5-4.fc19")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "httpcomponents-client");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1834.NASL
    descriptionUpdated packages for Red Hat JBoss Enterprise Application Platform 5.2.0 that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform is a platform for Java applications, which integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam. It was discovered that the HttpClient incorrectly extracted host name from an X.509 certificate subject
    last seen2020-06-01
    modified2020-06-02
    plugin id79205
    published2014-11-12
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79205
    titleRHEL 5 / 6 : JBoss EAP (RHSA-2014:1834)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:1834. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(79205);
      script_version("1.12");
      script_cvs_date("Date: 2019/10/24 15:35:39");
    
      script_cve_id("CVE-2012-6153", "CVE-2014-3577");
      script_xref(name:"RHSA", value:"2014:1834");
    
      script_name(english:"RHEL 5 / 6 : JBoss EAP (RHSA-2014:1834)");
      script_summary(english:"Checks the rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated packages for Red Hat JBoss Enterprise Application Platform
    5.2.0 that fix two security issues are now available for Red Hat
    Enterprise Linux 4, 5, and 6.
    
    Red Hat Product Security has rated this update as having Important
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Red Hat JBoss Enterprise Application Platform is a platform for Java
    applications, which integrates the JBoss Application Server with JBoss
    Hibernate and JBoss Seam.
    
    It was discovered that the HttpClient incorrectly extracted host name
    from an X.509 certificate subject's Common Name (CN) field. A
    man-in-the-middle attacker could use this flaw to spoof an SSL server
    using a specially crafted X.509 certificate. (CVE-2012-6153,
    CVE-2014-3577)
    
    The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat
    Product Security.
    
    For additional information on these flaws, refer to the Knowledgebase
    article in the References section.
    
    All users of Red Hat JBoss Enterprise Application Platform 5.2.0 on
    Red Hat Enterprise Linux 4, 5, and 6 are advised to upgrade to these
    updated packages. The JBoss server process must be restarted for the
    update to take effect."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/solutions/1165533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:1834"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2012-6153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-3577"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected apache-cxf package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:apache-cxf");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/11/10");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:1834";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL5", rpm:"jbossas-welcome-content-eap") || rpm_exists(release:"RHEL6", rpm:"jbossas-welcome-content-eap"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "JBoss EAP");
    
      if (rpm_check(release:"RHEL5", reference:"apache-cxf-2.2.12-14.patch_09.ep5.el5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"apache-cxf-2.2.12-14.patch_09.el6")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "apache-cxf");
      }
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-0158.NASL
    descriptionRed Hat Enterprise Virtualization Manager 3.5.0 is now available. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual servers running Red Hat Enterprise Linux and Microsoft Windows. This package also includes the Red Hat Enterprise Virtualization Manager API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API). It was discovered that the HttpClient incorrectly extracted the host name from an X.509 certificate subject
    last seen2020-06-01
    modified2020-06-02
    plugin id85712
    published2015-09-01
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85712
    titleRHEL 6 : Virtualization Manager (RHSA-2015:0158)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-1162.NASL
    descriptionUpdated Red Hat JBoss Enterprise Application Platform 6.3.0 packages that fix two security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server host name matches the domain name in a subject
    last seen2020-06-01
    modified2020-06-02
    plugin id77561
    published2014-09-08
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77561
    titleRHEL 5 / 6 / 7 : JBoss EAP (RHSA-2014:1162)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2014-9539.NASL
    descriptionSecurity fix for CVE-2014-3577, CVE-2012-6153 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2014-08-27
    plugin id77396
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/77396
    titleFedora 19 : jakarta-commons-httpclient-3.1-15.fc19 (2014-9539)

Redhat

advisories
  • rhsa
    idRHSA-2014:1098
  • rhsa
    idRHSA-2014:1833
  • rhsa
    idRHSA-2014:1834
  • rhsa
    idRHSA-2014:1835
  • rhsa
    idRHSA-2014:1836
  • rhsa
    idRHSA-2014:1891
  • rhsa
    idRHSA-2014:1892
  • rhsa
    idRHSA-2015:0125
  • rhsa
    idRHSA-2015:0158
  • rhsa
    idRHSA-2015:0675
  • rhsa
    idRHSA-2015:0720
  • rhsa
    idRHSA-2015:0765
  • rhsa
    idRHSA-2015:0850
  • rhsa
    idRHSA-2015:0851
  • rhsa
    idRHSA-2015:1888
rpms
  • devtoolset-2-httpcomponents-client-0:4.2.1-6.el6
  • devtoolset-2-httpcomponents-client-javadoc-0:4.2.1-6.el6
  • httpclient-eap6-0:4.2.1-12.redhat_2.1.ep6.el5
  • httpclient-eap6-0:4.2.1-12.redhat_2.1.ep6.el6
  • httpclient-eap6-0:4.2.1-12.redhat_2.1.ep6.el7
  • httpcomponents-client-eap6-0:4.2.1-12.redhat_2.1.ep6.el5
  • httpcomponents-client-eap6-0:4.2.1-12.redhat_2.1.ep6.el6
  • httpcomponents-client-eap6-0:4.2.1-12.redhat_2.1.ep6.el7
  • httpcomponents-core-eap6-0:4.2.1-12.redhat_2.1.ep6.el5
  • httpcomponents-core-eap6-0:4.2.1-12.redhat_2.1.ep6.el6
  • httpcomponents-core-eap6-0:4.2.1-12.redhat_2.1.ep6.el7
  • httpcomponents-project-eap6-0:6-12.redhat_2.1.ep6.el5
  • httpcomponents-project-eap6-0:6-12.redhat_2.1.ep6.el6
  • httpcomponents-project-eap6-0:6-12.redhat_2.1.ep6.el7
  • httpcore-eap6-0:4.2.1-12.redhat_2.1.ep6.el5
  • httpcore-eap6-0:4.2.1-12.redhat_2.1.ep6.el6
  • httpcore-eap6-0:4.2.1-12.redhat_2.1.ep6.el7
  • httpmime-eap6-0:4.2.1-12.redhat_2.1.ep6.el5
  • httpmime-eap6-0:4.2.1-12.redhat_2.1.ep6.el6
  • httpmime-eap6-0:4.2.1-12.redhat_2.1.ep6.el7
  • jakarta-commons-httpclient-1:3.1-4_patch_02.el6_5
  • jakarta-commons-httpclient-1:3.1-4_patch_02.ep5.el4
  • jakarta-commons-httpclient-1:3.1-4_patch_02.ep5.el5
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jakarta-commons-httpclient-1:3.1-4_patch_02.el6_5
  • jakarta-commons-httpclient-1:3.1-4_patch_02.ep5.el4
  • jakarta-commons-httpclient-1:3.1-4_patch_02.ep5.el5
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-docs-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-examples-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.el6
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.ep5.el4
  • jboss-seam2-runtime-0:2.2.6.EAP5-22_patch_01.ep5.el5
  • apache-cxf-0:2.2.12-14.patch_09.el6
  • apache-cxf-0:2.2.12-14.patch_09.ep5.el4
  • apache-cxf-0:2.2.12-14.patch_09.ep5.el5
  • apache-cxf-0:2.2.12-14.patch_09.el6
  • apache-cxf-0:2.2.12-14.patch_09.ep5.el4
  • apache-cxf-0:2.2.12-14.patch_09.ep5.el5
  • apache-cxf-0:2.7.12-1.SP1_redhat_5.1.ep6.el5
  • apache-cxf-0:2.7.12-1.SP1_redhat_5.1.ep6.el6
  • apache-cxf-0:2.7.12-1.SP1_redhat_5.1.ep6.el7
  • wss4j-0:1.6.16-2.redhat_3.1.ep6.el5
  • wss4j-0:1.6.16-2.redhat_3.1.ep6.el6
  • wss4j-0:1.6.16-2.redhat_3.1.ep6.el7
  • rhevm-0:3.5.0-0.29.el6ev
  • rhevm-backend-0:3.5.0-0.29.el6ev
  • rhevm-dbscripts-0:3.5.0-0.29.el6ev
  • rhevm-extensions-api-impl-0:3.5.0-0.29.el6ev
  • rhevm-extensions-api-impl-javadoc-0:3.5.0-0.29.el6ev
  • rhevm-lib-0:3.5.0-0.29.el6ev
  • rhevm-restapi-0:3.5.0-0.29.el6ev
  • rhevm-setup-0:3.5.0-0.29.el6ev
  • rhevm-setup-base-0:3.5.0-0.29.el6ev
  • rhevm-setup-plugin-allinone-0:3.5.0-0.29.el6ev
  • rhevm-setup-plugin-ovirt-engine-0:3.5.0-0.29.el6ev
  • rhevm-setup-plugin-ovirt-engine-common-0:3.5.0-0.29.el6ev
  • rhevm-setup-plugin-websocket-proxy-0:3.5.0-0.29.el6ev
  • rhevm-tools-0:3.5.0-0.29.el6ev
  • rhevm-userportal-0:3.5.0-0.29.el6ev
  • rhevm-webadmin-portal-0:3.5.0-0.29.el6ev
  • rhevm-websocket-proxy-0:3.5.0-0.29.el6ev