code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(110567);
script_version("1.7");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2018-0339");
script_bugtraq_id(104424);
script_xref(name:"CISCO-BUG-ID", value:"CSCvf72309");
script_xref(name:"CISCO-SA", value:"cisco-sa-20180606-ise-xss");
script_name(english:"Cisco Identity Services Engine Cross-Site Scripting Vulnerability");
script_summary(english:"Checks the Cisco Identity Services Engine Software version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Identity Services
Engine Software is affected by a cross-site scripting vulnerability.
Please see the included Cisco BID and the Cisco Security Advisory for
more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-ise-xss
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b6021a6f");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf72309");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvf72309.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0339");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/16");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/06/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/h:cisco:identity_services_engine");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ise_detect.nbin");
script_require_keys("Host/Cisco/ISE/version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco Identity Services Engine Software");
vuln_ranges = [
{ 'min_ver' : '2.3.0', 'fix_ver' : '2.4.0.357' }
];
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , "CSCvf72309",
'fix' , 'See advisory',
'xss' , TRUE
);
cisco::check_and_report(product_info:product_info, reporting:reporting, workarounds:workarounds, workaround_params:workaround_params, vuln_ranges:vuln_ranges);
|