code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(126632);
script_version("1.7");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2019-1817");
script_xref(name:"CISCO-BUG-ID", value:"CSCvn31450");
script_xref(name:"CISCO-SA", value:"cisco-sa-20190501-wsa-dos");
script_name(english:"Cisco Web Security Appliance Malformed Request Denial of Service Vulnerability");
script_summary(english:"Checks the version of Cisco Web Security Appliance (WSA)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Web Security Appliance (WSA) is affected by a denial of service (DoS)
vulnerability due to improper validation of HTTP / HTTPS requests. An unauthenticated, remote attacker can exploit this
issue, by sending malformed requests, to cause the application to temporarily stop responding.
Please see the included Cisco BIDs and Cisco Security Advisory for more information");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-wsa-dos
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ed846d6a");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn31450");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvn31450");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1817");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(20);
script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/01");
script_set_attribute(attribute:"patch_publication_date", value:"2019/05/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/12");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:web_security_appliance");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_wsa_version.nasl");
script_require_keys("Host/AsyncOS/Cisco Web Security Appliance/DisplayVersion", "Host/AsyncOS/Cisco Web Security Appliance/Version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
product_info = cisco::get_product_info(name:'Cisco Web Security Appliance (WSA)');
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , 'CSCvn31450'
);
vuln_ranges = [
{ 'min_ver' : '11.5', 'fix_ver' : '11.5.2-020' },
{ 'min_ver' : '11.7', 'fix_ver' : '11.7.0-406' }
];
cisco::check_and_report(
product_info:product_info,
workarounds:workarounds,
workaround_params:workaround_params,
reporting:reporting,
vuln_ranges:vuln_ranges
);
|