code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(125032);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/08");
script_cve_id("CVE-2019-1862");
script_xref(name:"CISCO-BUG-ID", value:"CSCvn20358");
script_xref(name:"CISCO-SA", value:"cisco-sa-20190513-webui");
script_xref(name:"IAVA", value:"2019-A-0158-S");
script_name(english:"Cisco IOS XE Software Web UI Command Injection Vulnerability");
script_summary(english:"Checks the version of Cisco IOS XE Software");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS XE Software is affected by a vulnerability in the web-based user
interface (Web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to execute commands on the
underlying Linux shell of an affected device with root privileges. The vulnerability occurs because the affected software
improperly sanitizes user-supplied input. An attacker who has valid administrator access to an affected device could
exploit this vulnerability by supplying a crafted input parameter on a form in the Web UI and then submitting that form.
A successful exploit could allow the attacker to run arbitrary commands on the device with root privileges, which may
lead to complete system compromise.
Please see the included Cisco BIDs and Cisco Security Advisory for more information");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-webui
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?220946d4");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn20358");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvn20358");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1862");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(20);
script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/13");
script_set_attribute(attribute:"patch_publication_date", value:"2019/05/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');
product_info = cisco::get_product_info(name:'Cisco IOS XE Software');
version_list=make_list(
'3.2.0JA',
'16.9.2s',
'16.9.2a',
'16.9.2',
'16.9.1s',
'16.9.1d',
'16.9.1c',
'16.9.1b',
'16.9.1a',
'16.9.1',
'16.8.2',
'16.7.3',
'16.7.2',
'16.6.4s',
'16.6.4a',
'16.6.4'
);
workarounds = make_list(CISCO_WORKAROUNDS['HTTP_Server_iosxe']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCvn20358'
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|