Language:
https://kojihub.stream.centos.org/koji/buildinfo?buildID=16715
Severity: High
ID: 191321
File Name: centos9_nginx-1_20_1-10.nasl
Version: 1.1
Type: local
Agent: unix
Family: CentOS Local Security Checks
Published: 2/29/2024
Updated: 4/26/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus
Risk Factor: Medium
Score: 5.2
Risk Factor: Medium
Base Score: 5.8
Temporal Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2021-3618
Risk Factor: High
Base Score: 7.4
Temporal Score: 6.4
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:centos:centos:nginx-mod-http-xslt-filter, p-cpe:/a:centos:centos:nginx-all-modules, p-cpe:/a:centos:centos:nginx-filesystem, cpe:/a:centos:centos:9, p-cpe:/a:centos:centos:nginx-mod-stream, p-cpe:/a:centos:centos:nginx-mod-mail, p-cpe:/a:centos:centos:nginx-mod-http-image-filter, p-cpe:/a:centos:centos:nginx, p-cpe:/a:centos:centos:nginx-mod-devel, p-cpe:/a:centos:centos:nginx-mod-http-perl
Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 2/2/2022
Vulnerability Publication Date: 10/25/2021
CVE: CVE-2021-3618