code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(135971);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/27");
script_cve_id("CVE-2020-3156");
script_xref(name:"CISCO-BUG-ID", value:"CSCvs19481");
script_xref(name:"CISCO-SA", value:"cisco-sa-ise-xss-s3ekcKch");
script_name(english:"Cisco Identity Services Engine Cross-Site Scripting Vulnerability (cisco-sa-ise-xss-s3ekcKch)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Identity Services Engine Software is affected by a vulnerability. Please
see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-s3ekcKch
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d01707cd");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvs19481");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvs19481");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3156");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(79);
script_set_attribute(attribute:"vuln_publication_date", value:"2020/02/19");
script_set_attribute(attribute:"patch_publication_date", value:"2020/02/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/24");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:identity_services_engine");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ise_detect.nbin");
script_require_keys("Host/Cisco/ISE/version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
product_info = cisco::get_product_info(name:'Cisco Identity Services Engine Software');
vuln_ranges = [
{ 'min_ver' : '2.6.0', 'fix_ver' : '2.6.0.156' },
{ 'min_ver' : '2.7.0', 'fix_ver' : '2.7.0.356' }
];
required_patch ='';
if (product_info['version'] =~ "^2\.6\.0($|[^0-9])") required_patch = '4';
if (product_info['version'] =~ "^2\.7\.0($|[^0-9])") required_patch = '1';
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , 'CSCvs19481',
'disable_caveat', TRUE
);
cisco::check_and_report(
product_info:product_info,
reporting:reporting,
vuln_ranges:vuln_ranges,
required_patch:required_patch
);
|