Add CVEs for No-STARTTLS vulnerability

In text output only the original one from Wietse Venema.
The other known so far in JSON/CSV
This commit is contained in:
Dirk 2021-08-08 21:30:35 +02:00
parent 89de30c867
commit aaf6409581

View File

@ -18317,14 +18317,15 @@ run_tls_truncation() {
: :
} }
# see https://nostarttls.secvuln.info/
#
run_starttls_injection() { run_starttls_injection() {
local uds="" local uds=""
local openssl_bin="" local openssl_bin=""
local -i socat_pid local -i socat_pid
local -i openssl_pid local -i openssl_pid
local vuln=false local vuln=false
local cve="" local cve="CVE-2011-0411 CVE-2021-38084 CVE-2021-33515 CVE-2020-15955 CVE-2021-37844 CVE-2021-37845 CVE-2021-37846 CVE-2020-29548 CVE-2020-15955 CVE-2020-29547"
local cwe="CWE-74" local cwe="CWE-74"
local hint="" local hint=""
local jsonID="starttls_injection" local jsonID="starttls_injection"
@ -18336,7 +18337,7 @@ run_starttls_injection() {
pr_headlineln " Checking for STARTTLS injection " pr_headlineln " Checking for STARTTLS injection "
outln outln
fi fi
pr_bold " STARTTLS injection" ; out " (experimental) " pr_bold " STARTTLS injection" ; out " (CVE-2011-0411, exp.) "
# We'll do a soft fail here, also no warning, as I do not expect to have everybody have socat installed # We'll do a soft fail here, also no warning, as I do not expect to have everybody have socat installed
if [[ -z "$SOCAT" ]]; then if [[ -z "$SOCAT" ]]; then