what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Nessus Cross Site Scripting / Information Disclosure

Nessus Cross Site Scripting / Information Disclosure
Posted Jul 26, 2010
Authored by Renaud Deraison | Site nessus.org

The Nessus nessusd_www_server.nbin file suffers from cross site scripting and version disclosure vulnerabilities.

tags | advisory, vulnerability, xss, info disclosure
SHA-256 | 8ebf160c845108fcb7fac85ca7e6aa7427a189c844a2dadca4911d578a00cd6e

Nessus Cross Site Scripting / Information Disclosure

Change Mirror Download
Jul 26, 2010 3:33 PM
[Security] nessusd_www_server.nbin cross site scripting and version disclosure


Issues Description


The Nessus Web Server (nessusd_www_server.nbin) was vulnerable to the following two issues:


1. Cross Site Scripting Vulnerability


The Nessus Web Server was vulnerable to a cross site scripting vulnerability. This vulnerability might allow an attacker who knows the URL of a running server to construct an attack by sending a specially malformed link to an operator logged into the Nessus console and steal his authentication cookie.


2. A version disclosure in the web server


It is possible to obtain the version of the Nessus server running by requesting the /feed method. While this is not a vulnerability per se, some users might prefer this information to be hidden and we realized there was no way to do so. If you want to hide the version of nessusd, update your plugins, set the parameter "xmlrpc_hide_version = yes" into nessusd.conf and restart nessusd.


Solutions and fixes
As the Nessus Web Server is exclusively distributed through the plugin feed (as nessusd_www_server.nbin), there is no need to upgrade your Nessus installation, simply make sure your plugins are up-to-date.


A few weeks ago, we pushed a new build of the Nessus Web Server into the plugin feed. If you server updates automatically, you should already be patched. You can verify the version of the server you're running by logging into the Nessus server and click on the "About" button of the web interface. Make sure that you're running version 1.2.6 of the web server or newer. If your server is not up-to-date, run /opt/nessus/bin/nessus-update-plugins from the command-line and restart your Nessus server.


If you have any other question with regards to the updates or the security of the server, feel free to contact me directly.


Credit
Tenable would like to thank the following individuals for alerting us about these vulnerabilities and dealing with them responsibly:


- Emmanuel Bouillon from the NATO C3 Agency, for the XSS vulnerability
- Jason Jones from Inner Security for the version disclosure issue


Timeline
Both issues have been fixed within less than 24 hours of receiving the reports from researchers:


2010/06/24: Received initial report about the XSS issue in the web server
2010/06/24: Version 1.2.4 of the web server, which solves this issue, is pushed into the feed. Initial reporter agrees to wait for a few weeks to make sure the update is deployed as widely as possible
2010/07/06: Received initial report about the version disclosure issue
2010/07/07: Version 1.2.6 of the web server, which adds support for the xmlrpc_hide_version option, is pushed into the feed. Initial reporter agrees to wait for a few weeks to make sure the update is deployed as widely as possible
2010/07/26: Public announcement


FAQ


Q: Which component of Nessus is affected by the vulnerability?
A: A Nessus plugin, called "nessusd_www_server.nbin" is affected by this vulnerability. This plugin is in charge of providing the HTTP services that the Flash Nessus Client uses to do its job. It acts as a gateway between web requests and the Nessus scanning server. The Nessus scanning server itself (nessusd) is not affected by this vulnerability.


Q: How do I apply the patch this vulnerability? Where do I find it?
A: A corrected version of the web server has been pushed over three weeks ago in the plugin feed. If your scanner is registered properly, you are already patched. If you do not update your plugins regularly, simply update your plugins and you will be patched. To verify if you're running the corrected version of the web server, log into your Nessus console, click on "About", and make sure you're running version 1.2.6 of the web server or newer


Q: Do I need to upgrade my Nessus server to fix this vulnerability (using a newer .rpm, .deb, or .exe file?)
A: No. The solely affected component is nessusd_www_server.nbin which does not ship with the Nessus core installation, but ships through the plugin feed.


Q: How do I hide the version number of my Nessus installation to web users?
A: Edit nessusd.conf and add "xmlrpc_hide_version = yes", then restart nessusd


Q: Could an attacker leverage this vulnerability to gain control of my computer?
A: No. The web server component can not execute arbitrary commands on your local computer.


Q: Could an attacker leverage this vulnerability to recover the credentials I put in my policy?
A: No. The web server component does not have access to the credentials stored in your policies.



Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close