code | #
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(101840);
script_version("1.6");
script_cvs_date("Date: 2019/11/12");
script_cve_id(
"CVE-2017-2335",
"CVE-2017-2336",
"CVE-2017-2337",
"CVE-2017-2338",
"CVE-2017-2339"
);
script_bugtraq_id(99590);
script_xref(name:"JSA", value:"JSA10782");
script_name(english:"Juniper ScreenOS 6.3.x < 6.3.0r24 Multiple XSS (JSA10782)");
script_summary(english:"Checks the version of ScreenOS.");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple cross-site scripting
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Juniper ScreenOS running on the remote host is 6.3.x
prior to 6.3.0r24. It is, therefore, affected by multiple cross-site
scripting (XSS) vulnerabilities in the web user interface due to
improper validation of user-supplied input before returning it to
users. An authenticated, remote attacker who has a 'security' role can
exploit this issue to inject HTML or JavaScript into the management
session of other users, including the administrator.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10782");
# http://www.juniper.net/techpubs/en_US/screenos6.3.0/information-products/pathway-pages/screenos/index.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c4eb1929");
script_set_attribute(attribute:"solution", value:
"Upgrade to Juniper ScreenOS version 6.3.0r24 or later. Alternatively,
apply the workaround referenced in the vendor's advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-2339");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/07/12");
script_set_attribute(attribute:"patch_publication_date", value:"2017/07/12");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/18");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:screenos");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Firewalls");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("screenos_version.nbin", "screenos_unsupported.nasl");
script_require_keys("Host/Juniper/ScreenOS/display_version", "Host/Juniper/ScreenOS/version");
script_exclude_keys("Host/Juniper/ScreenOS/unsupported");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
app_name = "Juniper ScreenOS";
display_version = get_kb_item_or_exit("Host/Juniper/ScreenOS/display_version");
version = get_kb_item_or_exit("Host/Juniper/ScreenOS/version");
if (get_kb_item("Host/Juniper/ScreenOS/unsupported"))
exit(0, app_name + " version " + display_version + " is installed and no longer supported, therefore, it was not checked.");
# prior to 6.3.0r24 are affected. 6.2 and prior are unsupported
# fix is 6.3.0r24 and later
if (ver_compare(ver:version, minver:"6.3.0.0", fix:"6.3.0.24", strict:FALSE) < 0)
{
display_fix = "6.3.0r24";
port = 0;
report =
'\n Installed version : ' + display_version +
'\n Fixed version : ' + display_fix +
'\n';
security_report_v4(port:port, extra:report, severity:SECURITY_NOTE, xss:TRUE);
}
else audit(AUDIT_INST_VER_NOT_VULN, app_name, display_version);
|