NewStart CGSL MAIN 6.02 : webkit2gtk3 Multiple Vulnerabilities (NS-SA-2024-0053)

critical Nessus Plugin ID 206839

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.02, has webkit2gtk3 packages installed that are affected by multiple vulnerabilities:

- A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution.
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-13558)

- A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-27918)

- A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality. (CVE-2020-29623)

- A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.
(CVE-2021-1765, CVE-2021-1801)

- A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-1788)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL webkit2gtk3 packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/info/CVE-2021-1871

https://security.gd-linux.com/info/CVE-2021-21775

https://security.gd-linux.com/info/CVE-2021-21779

https://security.gd-linux.com/info/CVE-2021-21806

https://security.gd-linux.com/info/CVE-2021-30663

https://security.gd-linux.com/info/CVE-2021-30665

https://security.gd-linux.com/info/CVE-2021-30682

https://security.gd-linux.com/info/CVE-2021-30689

https://security.gd-linux.com/info/CVE-2021-30720

https://security.gd-linux.com/info/CVE-2021-30734

https://security.gd-linux.com/info/CVE-2021-30744

https://security.gd-linux.com/info/CVE-2021-30749

https://security.gd-linux.com/info/CVE-2021-30758

https://security.gd-linux.com/info/CVE-2021-30795

https://security.gd-linux.com/info/CVE-2021-30797

https://security.gd-linux.com/info/CVE-2021-30799

https://security.gd-linux.com/info/CVE-2021-30809

https://security.gd-linux.com/info/CVE-2021-30818

https://security.gd-linux.com/info/CVE-2021-30823

https://security.gd-linux.com/info/CVE-2021-30836

https://security.gd-linux.com/info/CVE-2021-30846

https://security.gd-linux.com/info/CVE-2021-30848

https://security.gd-linux.com/info/CVE-2021-30849

https://security.gd-linux.com/info/CVE-2021-30851

https://security.gd-linux.com/info/CVE-2021-30858

https://security.gd-linux.com/info/CVE-2021-30884

https://security.gd-linux.com/info/CVE-2021-30887

https://security.gd-linux.com/info/CVE-2021-30888

https://security.gd-linux.com/info/CVE-2021-30889

https://security.gd-linux.com/info/CVE-2021-30890

https://security.gd-linux.com/info/CVE-2021-30897

https://security.gd-linux.com/info/CVE-2021-30934

https://security.gd-linux.com/info/CVE-2021-30936

https://security.gd-linux.com/info/CVE-2021-30951

https://security.gd-linux.com/info/CVE-2021-30952

https://security.gd-linux.com/info/CVE-2021-30953

https://security.gd-linux.com/info/CVE-2021-30954

https://security.gd-linux.com/info/CVE-2021-30984

https://security.gd-linux.com/notice/NS-SA-2024-0053

https://security.gd-linux.com/info/CVE-2020-13558

https://security.gd-linux.com/info/CVE-2020-27918

https://security.gd-linux.com/info/CVE-2020-29623

https://security.gd-linux.com/info/CVE-2021-1765

https://security.gd-linux.com/info/CVE-2021-1788

https://security.gd-linux.com/info/CVE-2021-1789

https://security.gd-linux.com/info/CVE-2021-1799

https://security.gd-linux.com/info/CVE-2021-1801

https://security.gd-linux.com/info/CVE-2021-1844

https://security.gd-linux.com/info/CVE-2021-1870

https://security.gd-linux.com/info/CVE-2021-45481

https://security.gd-linux.com/info/CVE-2021-45482

https://security.gd-linux.com/info/CVE-2021-45483

https://security.gd-linux.com/info/CVE-2022-22589

https://security.gd-linux.com/info/CVE-2022-22590

https://security.gd-linux.com/info/CVE-2022-22592

https://security.gd-linux.com/info/CVE-2022-22594

https://security.gd-linux.com/info/CVE-2022-22620

https://security.gd-linux.com/info/CVE-2022-22637

Plugin Details

Severity: Critical

ID: 206839

File Name: newstart_cgsl_NS-SA-2024-0053_webkit2gtk3.nasl

Version: 1.1

Type: local

Published: 9/10/2024

Updated: 9/10/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-30954

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

CVSS Score Source: CVE-2021-1871

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:webkit2gtk3-jsc, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:webkit2gtk3-jsc-devel, p-cpe:/a:zte:cgsl_main:webkit2gtk3, p-cpe:/a:zte:cgsl_main:webkit2gtk3-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/3/2024

Vulnerability Publication Date: 11/12/2020

CISA Known Exploited Vulnerability Due Dates: 11/17/2021, 2/25/2022, 5/25/2022

Reference Information

CVE: CVE-2020-13558, CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1788, CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1844, CVE-2021-1870, CVE-2021-1871, CVE-2021-21775, CVE-2021-21779, CVE-2021-21806, CVE-2021-30663, CVE-2021-30665, CVE-2021-30682, CVE-2021-30689, CVE-2021-30720, CVE-2021-30734, CVE-2021-30744, CVE-2021-30749, CVE-2021-30758, CVE-2021-30795, CVE-2021-30797, CVE-2021-30799, CVE-2021-30809, CVE-2021-30818, CVE-2021-30823, CVE-2021-30836, CVE-2021-30846, CVE-2021-30848, CVE-2021-30849, CVE-2021-30851, CVE-2021-30858, CVE-2021-30884, CVE-2021-30887, CVE-2021-30888, CVE-2021-30889, CVE-2021-30890, CVE-2021-30897, CVE-2021-30934, CVE-2021-30936, CVE-2021-30951, CVE-2021-30952, CVE-2021-30953, CVE-2021-30954, CVE-2021-30984, CVE-2021-45481, CVE-2021-45482, CVE-2021-45483, CVE-2022-22589, CVE-2022-22590, CVE-2022-22592, CVE-2022-22594, CVE-2022-22620, CVE-2022-22637