code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(102361);
script_version("1.8");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2017-6618");
script_bugtraq_id(97927);
script_xref(name:"CISCO-BUG-ID", value:"CSCvd14587");
script_xref(name:"CISCO-SA", value:"cisco-sa-20170419-cimc1");
script_name(english:"Cisco Integrated Management Controller Cross-Site Scripting Vulnerability");
script_summary(english:"Checks the Cisco Unified Computing System (Management Software) version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Unified Computing System (Management Software) is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc1
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e5dae5e6");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd14587");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvd14587.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-6618");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/04/19");
script_set_attribute(attribute:"patch_publication_date", value:"2017/04/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/a:cisco:integrated_management_controller");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_imc_detect.nbin");
script_require_keys("Host/Cisco/CIMC/version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco Unified Computing System (Management Software)");
version_list = make_list(
"2.0(9)",
"2.0(10)",
"2.0(11)",
"2.0(12)",
"2.0(13)",
"3.0(1)c"
);
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_NOTE,
'version' , product_info['version'],
'bug_id' , "CSCvd14587",
'fix' , 'See advisory'
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|