Lexmark Markvision Enterprise Remote Command Execution

high Nessus Plugin ID 66328

Synopsis

The remote web server has a web application that is affected by a remote command execution vulnerability.

Description

The version of Lexmark Markvision installed on the remote host is earlier than 1.8.0 and gets installed with a Groovy Shell (intended for diagnostic purposes) that binds to TCP port 9789. This could allow for commands to be executed by an unauthenticated, remote attacker.

Note that this plugin does not verify that Groovy Shell is listening and instead only does a version check of Lexmark Markvision install.

Solution

Upgrade to Lexmark Markvision 1.8.0 or later.

See Also

http://www.nessus.org/u?db169a54

Plugin Details

Severity: High

ID: 66328

File Name: lexmark_markvision_enterprise_1_8.nasl

Version: 1.3

Type: remote

Family: Misc.

Published: 5/6/2013

Updated: 11/27/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-3055

Vulnerability Information

CPE: cpe:/a:lexmark:markvision

Required KB Items: www/lexmark_markvision_enterprise

Exploit Ease: No known exploits are available

Patch Publication Date: 4/22/2013

Vulnerability Publication Date: 4/22/2013

Reference Information

CVE: CVE-2013-3055

BID: 59513