mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Author: Patrik Karlsson <patrik@cqure.net> Date: Thu May 29 21:33:18 2014 -0400 fix to detect non ASA devices and unsupported versions
83 lines
2.7 KiB
Lua
83 lines
2.7 KiB
Lua
local anyconnect = require('anyconnect')
|
|
local stdnse = require('stdnse')
|
|
local shortport = require('shortport')
|
|
local vulns = require('vulns')
|
|
local sslcert = require('sslcert')
|
|
|
|
description = [[
|
|
Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126).
|
|
]]
|
|
|
|
---
|
|
-- @usage
|
|
-- nmap -p 443 --script http-vuln-cve2014-2126 <target>
|
|
--
|
|
-- @output
|
|
-- PORT STATE SERVICE
|
|
-- 443/tcp open https
|
|
-- | http-vuln-cve2014-2126:
|
|
-- | VULNERABLE:
|
|
-- | Cisco ASA ASDM Privilege Escalation Vulnerability
|
|
-- | State: VULNERABLE
|
|
-- | Risk factor: High CVSSv2: 8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C)
|
|
-- | Description:
|
|
-- | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496.
|
|
-- |
|
|
-- | References:
|
|
-- | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa
|
|
-- |_ http://cvedetails.com/cve/2014-2126/
|
|
|
|
|
|
author = "Patrik Karlsson <patrik@cqure.net>"
|
|
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
|
|
categories = {"vuln", "safe"}
|
|
|
|
portrule = function(host, port)
|
|
return shortport.ssl(host, port) or sslcert.isPortSupported(port)
|
|
end
|
|
|
|
action = function(host, port)
|
|
local vuln_table = {
|
|
title = "Cisco ASA ASDM Privilege Escalation Vulnerability",
|
|
state = vulns.STATE.NOT_VULN,
|
|
risk_factor = "High",
|
|
scores = {
|
|
CVSSv2 = "8.5 (HIGH) (AV:N/AC:M/AU:S/C:C/I:C/A:C)",
|
|
},
|
|
description = [[
|
|
Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5), 8.7 before 8.7(1.11), 9.0 before 9.0(3.10), and 9.1 before 9.1(3.4) allows remote authenticated users to gain privileges by leveraging level-0 ASDM access, aka Bug ID CSCuj33496.
|
|
]],
|
|
|
|
references = {
|
|
'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa',
|
|
'http://cvedetails.com/cve/2014-2126/'
|
|
}
|
|
}
|
|
|
|
local vuln_versions = {
|
|
['8'] = {
|
|
['2'] = 5.47,
|
|
['4'] = 7.5,
|
|
['7'] = 1.11,
|
|
},
|
|
['9'] = {
|
|
['0'] = 3.10,
|
|
['1'] = 3.4,
|
|
},
|
|
}
|
|
|
|
local report = vulns.Report:new(SCRIPT_NAME, host, port)
|
|
local ac = anyconnect.Cisco.AnyConnect:new(host, port)
|
|
local status, err = ac:connect()
|
|
if not status then
|
|
return ("\n ERROR: %s"):format(err)
|
|
else
|
|
local ver = ac:get_version()
|
|
if vuln_versions[ver['major']] and vuln_versions[ver['major']][ver['minor']] then
|
|
if vuln_versions[ver['major']][ver['minor']] > tonumber(ver['rev']) then
|
|
vuln_table.state = vulns.STATE.VULN
|
|
end
|
|
end
|
|
end
|
|
return report:make_output(vuln_table)
|
|
end |