Tenable SecurityCenter 5.2.x / 5.3.x < 5.3.1 Multiple Vulnerabilities (TNS-2016-07)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The application installed on the remote host is affected by multiple
vulnerabilities.

Description :

According to its version, the Tenable SecurityCenter application
installed on the remote host is 5.2.x or 5.3.x prior to 5.3.1. It is,
therefore, affected by multiple vulnerabilities :

- Multiple cross-site scripting (XSS) vulnerabilities
exist due to a failure to properly validate input before
returning it to users. A remote attacker can exploit
these, via a crafted request, to execute arbitrary
script code in a user's browser session.
(CVE-2016-82008, CVE-2016-82009, CVE-2016-82010)

- An unspecified flaw exists that allows an authenticated,
remote attacker to disclose the installation path of
the application. (CVE-2016-82011)

- A flaw exists in Apache Felix due to a failure to use
the HTTPOnly or Secure attribute for authentication
cookies. An unauthenticated, remote attacker can exploit
this to more easily disclose sensitive information.
(VulnDB 136592)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://www.tenable.com/security/tns-2016-07

Solution :

Upgrade to Tenable SecurityCenter version 5.3.1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 90429 ()

Bugtraq ID:

CVE ID: CVE-2016-82008
CVE-2016-82009
CVE-2016-82010
CVE-2016-82011

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now