HP Business Service Management 9.12 remote code execution vulnerability

2012-05-16T00:00:00
ID VU:859230
Type cert
Reporter CERT
Modified 2012-05-16T00:00:00

Description

Overview

The HP Business Service Management (HPBSM) application contains a remote code execution vulnerability. Version 9.12 has been reported to be affected but other versions may also be affected.

Description

HPBSM uses the JBOSS application server. In the default configuration, HPBSM contains open ports that may be accessed by an unauthenticated attacker. The attacker can upload a jsp-shell as a .war file and have the JBOSS application server deploy it as a service. In the default configuration, this attacker shell will run with SYSTEM privileges.


Impact

An unauthenticated attacker may be able to deploy a backdoor shell with SYSTEM privileges.


Solution

We are currently unaware of a practical solution to this problem. Please consider the following workarounds.


Restrict Access

Implement appropriate firewall rules to block traffic from untrusted sources to TCP ports 4444, 1098, and 1099.


Vendor Information

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Hewlett-Packard Company| | 02 Apr 2012| 14 May 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | 10.0 | AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal | 9.0 | E:H/RL:U/RC:UC
Environmental | 9.0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

  • <http://www8.hp.com/us/en/software/software-solution.html?compURI=tcm:245-937035>

Credit

Thanks to David Elze of Daimler TSS for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-2561
  • Date Public: 16 May 2012
  • Date First Published: 16 May 2012
  • Date Last Updated: 16 May 2012
  • Document Revision: 17