Lucene search

K
cve[email protected]CVE-2013-3609
HistorySep 08, 2013 - 3:17 a.m.

CVE-2013-3609

2013-09-0803:17:39
CWE-20
web.nvd.nist.gov
30
supermicro
ipmi
cve-2013-3609
authorization
javascript
security vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.6%

The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-, X9DB, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.

Affected configurations

NVD
Node
supermicroh8dcl-6fMatch-
OR
supermicroh8dcl-ifMatch-
OR
supermicroh8dct-hibqfMatch-
OR
supermicroh8dct-hln4fMatch-
OR
supermicroh8dct-ibqfMatch-
OR
supermicroh8dg6-fMatch-
OR
supermicroh8dgg-qfMatch-
OR
supermicroh8dgi-fMatch-
OR
supermicroh8dgt-hfMatch-
OR
supermicroh8dgt-hibqfMatch-
OR
supermicroh8dgt-hlfMatch-
OR
supermicroh8dgt-hlibqfMatch-
OR
supermicroh8dgu-fMatch-
OR
supermicroh8dgu-ln4f\+Match-
OR
supermicroh8scm-fMatch-
OR
supermicroh8sgl-fMatch-
OR
supermicroh8sme-fMatch-
OR
supermicroh8sml-7Match-
OR
supermicroh8sml-7fMatch-
OR
supermicroh8sml-iMatch-
OR
supermicroh8sml-ifMatch-
OR
supermicrox7spa-hfMatch-
OR
supermicrox7spa-hf-d525Match-
OR
supermicrox7spe-h-d525Match-
OR
supermicrox7spe-hfMatch-
OR
supermicrox7spe-hf-d525Match-
OR
supermicrox7spt-df-d525Match-
OR
supermicrox7spt-df-d525\+Match-
OR
supermicrox8dtl-3fMatch-
OR
supermicrox8dtl-6fMatch-
OR
supermicrox8dtl-ifMatch-
OR
supermicrox8dtn\+-fMatch-
OR
supermicrox8dtn\+-f-lrMatch-
OR
supermicrox8dtu-6f\+Match-
OR
supermicrox8dtu-6f\+-lrMatch-
OR
supermicrox8dtu-6tf\+Match-
OR
supermicrox8dtu-6tf\+-lrMatch-
OR
supermicrox8dtu-ln4f\+Match-
OR
supermicrox8dtu-ln4f\+-lrMatch-
OR
supermicrox8si6-fMatch-
OR
supermicrox8sia-fMatch-
OR
supermicrox8sie-fMatch-
OR
supermicrox8sie-ln4fMatch-
OR
supermicrox8sil-fMatch-
OR
supermicrox8sit-fMatch-
OR
supermicrox8sit-hfMatch-
OR
supermicrox8siu-fMatch-
OR
supermicrox9dax-7fMatch-
OR
supermicrox9dax-7f-hftMatch-
OR
supermicrox9dax-7tfMatch-
OR
supermicrox9dax-ifMatch-
OR
supermicrox9dax-if-hftMatch-
OR
supermicrox9dax-itfMatch-
OR
supermicrox9db3-fMatch-
OR
supermicrox9db3-tpfMatch-
OR
supermicrox9dbi-fMatch-
OR
supermicrox9dbi-tpfMatch-
OR
supermicrox9dbl-3fMatch-
OR
supermicrox9dbl-ifMatch-
OR
supermicrox9dbu-3fMatch-
OR
supermicrox9dbu-ifMatch-
OR
supermicrox9dr3-fMatch-
OR
supermicrox9dr3-ln4f\+Match-
OR
supermicrox9dr7-ln4fMatch-
OR
supermicrox9dr7-ln4f-jbodMatch-
OR
supermicrox9dr7-tf\+Match-
OR
supermicrox9drd-7jln4fMatch-
OR
supermicrox9drd-7ln4fMatch-
OR
supermicrox9drd-7ln4f-jbodMatch-
OR
supermicrox9drd-efMatch-
OR
supermicrox9drd-ifMatch-
OR
supermicrox9dre-ln4fMatch-
OR
supermicrox9dre-tf\+Match-
OR
supermicrox9drffMatch-
OR
supermicrox9drff-7Match-
OR
supermicrox9drff-7\+Match-
OR
supermicrox9drff-7g\+Match-
OR
supermicrox9drff-7t\+Match-
OR
supermicrox9drff-7tg\+Match-
OR
supermicrox9drff-i\+Match-
OR
supermicrox9drff-ig\+Match-
OR
supermicrox9drff-it\+Match-
OR
supermicrox9drff-itg\+Match-
OR
supermicrox9drfrMatch-
OR
supermicrox9drg-hfMatch-
OR
supermicrox9drg-hf\+Match-
OR
supermicrox9drg-htfMatch-
OR
supermicrox9drg-htf\+Match-
OR
supermicrox9drh-7fMatch-
OR
supermicrox9drh-7tfMatch-
OR
supermicrox9drh-ifMatch-
OR
supermicrox9drh-itfMatch-
OR
supermicrox9dri-fMatch-
OR
supermicrox9dri-ln4f\+Match-
OR
supermicrox9drl-3fMatch-
OR
supermicrox9drl-efMatch-
OR
supermicrox9drl-ifMatch-
OR
supermicrox9drt-fMatch-
OR
supermicrox9drt-h6fMatch-
OR
supermicrox9drt-h6ibffMatch-
OR
supermicrox9drt-h6ibqfMatch-
OR
supermicrox9drt-hf\+Match-
OR
supermicrox9drt-ibffMatch-
OR
supermicrox9drt-ibqfMatch-
OR
supermicrox9drw-3ln4f\+Match-
OR
supermicrox9drw-3tf\+Match-
OR
supermicrox9drw-7tpf\+Match-
OR
supermicrox9drw-itpf\+Match-
OR
supermicrox9drx\+-fMatch-
OR
supermicrox9qr7-tfMatch-
OR
supermicrox9qr7-tf\+Match-
OR
supermicrox9qr7-tf-jbodMatch-
OR
supermicrox9qri-fMatch-
OR
supermicrox9qri-f\+Match-
OR
supermicrox9sbaa-fMatch-
OR
supermicrox9sca-fMatch-
OR
supermicrox9scd-fMatch-
OR
supermicrox9sce-fMatch-
OR
supermicrox9scff-fMatch-
OR
supermicrox9sci-ln4fMatch-
OR
supermicrox9scl\+-fMatch-
OR
supermicrox9scl-fMatch-
OR
supermicrox9scm-fMatch-
OR
supermicrox9scm-iifMatch-
OR
supermicrox9spu-fMatch-
OR
supermicrox9srd-fMatch-
OR
supermicrox9sre-3fMatch-
OR
supermicrox9sre-fMatch-
OR
supermicrox9srg-fMatch-
OR
supermicrox9sri-3fMatch-
OR
supermicrox9sri-fMatch-
OR
supermicrox9srl-fMatch-
OR
supermicrox9srw-fMatch-

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.016 Low

EPSS

Percentile

87.6%

Related for CVE-2013-3609