From 0d47952611198ef6b1163f366dc03922d20b1475 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Wed, 17 Apr 2024 09:42:04 +0200 Subject: Adding upstream version 7.94+git20230807.3be01efb1+dfsg. Signed-off-by: Daniel Baumann --- scripts/http-vuln-cve2014-2126.nse | 88 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 88 insertions(+) create mode 100644 scripts/http-vuln-cve2014-2126.nse (limited to 'scripts/http-vuln-cve2014-2126.nse') diff --git a/scripts/http-vuln-cve2014-2126.nse b/scripts/http-vuln-cve2014-2126.nse new file mode 100644 index 0000000..c4a5259 --- /dev/null +++ b/scripts/http-vuln-cve2014-2126.nse @@ -0,0 +1,88 @@ +local anyconnect = require('anyconnect') +local shortport = require('shortport') +local vulns = require('vulns') +local sslcert = require('sslcert') +local stdnse = require "stdnse" + +description = [[ +Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM +Privilege Escalation Vulnerability (CVE-2014-2126). +]] + +--- +-- @see http-vuln-cve2014-2127.nse +-- @see http-vuln-cve2014-2128.nse +-- @see http-vuln-cve2014-2129.nse +-- +-- @usage +-- nmap -p 443 --script http-vuln-cve2014-2126 +-- +-- @output +-- PORT STATE SERVICE +-- 443/tcp open https +-- | http-vuln-cve2014-2126: +-- | VULNERABLE: +-- | Cisco ASA ASDM Privilege Escalation Vulnerability +-- | State: VULNERABLE +-- | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C) +-- | Description: +-- | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. +-- | +-- | References: +-- | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa +-- |_ http://cvedetails.com/cve/2014-2126/ + + +author = "Patrik Karlsson " +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" +categories = {"vuln", "safe"} + +portrule = function(host, port) + return shortport.ssl(host, port) or sslcert.isPortSupported(port) +end + +action = function(host, port) + local vuln_table = { + title = "Cisco ASA ASDM Privilege Escalation Vulnerability", + state = vulns.STATE.NOT_VULN, + risk_factor = "High", + scores = { + CVSSv2 = "8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C)", + }, + description = [[ +Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496. + ]], + + references = { + 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa', + 'http://cvedetails.com/cve/2014-2126/' + } + } + + local vuln_versions = { + ['8'] = { + ['2'] = 5.47, + ['4'] = 7.5, + ['7'] = 1.11, + }, + ['9'] = { + ['0'] = 3.10, + ['1'] = 3.4, + }, + } + + local report = vulns.Report:new(SCRIPT_NAME, host, port) + local ac = anyconnect.Cisco.AnyConnect:new(host, port) + local status, err = ac:connect() + if not status then + return stdnse.format_output(false, err) + else + local ver = ac:get_version() + if vuln_versions[ver['major']] and vuln_versions[ver['major']][ver['minor']] then + if vuln_versions[ver['major']][ver['minor']] > tonumber(ver['rev']) then + vuln_table.state = vulns.STATE.VULN + end + end + end + return report:make_output(vuln_table) +end -- cgit v1.2.3