code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(110564);
script_version("1.7");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2018-0327");
script_bugtraq_id(104194);
script_xref(name:"CISCO-BUG-ID", value:"CSCvg86743");
script_xref(name:"CISCO-SA", value:"cisco-sa-20180516-ident-se-xss");
script_name(english:"Cisco Identity Services Engine Cross-Site Scripting Vulnerability");
script_summary(english:"Checks the Cisco Identity Services Engine Software version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Identity Services
Engine Software is affected by a cross-site scripting vulnerability.
Please see the included Cisco BID and the Cisco Security Advisory for
more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-ident-se-xss
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?68262716");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg86743");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvg86743.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0327");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/16");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/06/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/h:cisco:identity_services_engine");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ise_detect.nbin");
script_require_keys("Host/Cisco/ISE/version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco Identity Services Engine Software");
vuln_ranges = [
{ 'min_ver' : '2.1.0.474', 'fix_ver' : '2.1.0.475' }
];
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , "CSCvg86743",
'fix' , 'See advisory',
'xss' , TRUE
);
cisco::check_and_report(product_info:product_info, reporting:reporting, workarounds:workarounds, workaround_params:workaround_params, vuln_ranges:vuln_ranges);
|