Lucene search

K
nessusThis script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.HP_IMC_73_E0504P02.NASL
HistoryMar 28, 2017 - 12:00 a.m.

HPE Intelligent Management Center 7.2 E0403P06 Multiple Vulnerabilities

2017-03-2800:00:00
This script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
25

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.704 High

EPSS

Percentile

98.0%

The version of HPE Intelligent Management Center (IMC) running on the remote host is version 7.2 E0403P06. It is, therefore, affected by multiple vulnerabilities :

  • A flaw exists in UrlAccessController when handling URIs with the doFilter() method. A remote attacker can exploit this, via a specially crafted request, to bypass authorization. (CVE-2017-5791)

  • A flaw exists in CommonUtils due to improper sanitization of user-supplied input before using it in file operations. An authenticated, remote attacker can exploit this issue, via a specially crafted request that uses path traversal, to upload arbitrary files, which can then be used to execute arbitrary code.
    (CVE-2017-5793)

  • A flaw exists in FileUploadServlet due to improper sanitization of user-supplied input before using it in file operations. An authenticated, remote attacker can exploit this issue, via a specially crafted request that uses path traversal, to upload arbitrary files, which then can be used to execute arbitrary code.
    (CVE-2017-5794)

  • A flaw exists in FileDownloadServlet due to improper sanitization of user-supplied input to the ‘fileName’ parameter before using it in file operations. An authenticated, remote attacker can exploit this issue, via a specially crafted request that uses path traversal, to disclose the content of arbitrary files.
    (CVE-2017-5795)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(99030);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2017-5791",
    "CVE-2017-5793",
    "CVE-2017-5794",
    "CVE-2017-5795"
  );
  script_bugtraq_id(96773, 96815);
  script_xref(name:"HP", value:"HPESBHF03714");
  script_xref(name:"HP", value:"HPESBHF03715");
  script_xref(name:"HP", value:"HPESBHF03716");
  script_xref(name:"HP", value:"HPESBHF03717");
  script_xref(name:"HP", value:"emr_na-hpesbhf03714en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03715en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03716en_us");
  script_xref(name:"HP", value:"emr_na-hpesbhf03717en_us");
  script_xref(name:"ZDI", value:"ZDI-17-161");
  script_xref(name:"ZDI", value:"ZDI-17-163");
  script_xref(name:"ZDI", value:"ZDI-17-164");
  script_xref(name:"ZDI", value:"ZDI-17-165");

  script_name(english:"HPE Intelligent Management Center 7.2 E0403P06 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The version of HPE Intelligent Management Center on the remote host is
affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of HPE Intelligent Management Center (IMC) running on the
remote host is version 7.2 E0403P06. It is, therefore, affected by
multiple vulnerabilities :

  - A flaw exists in UrlAccessController when handling URIs
    with the doFilter() method. A remote attacker can
    exploit this, via a specially crafted request, to bypass
    authorization. (CVE-2017-5791)

  - A flaw exists in CommonUtils due to improper
    sanitization of user-supplied input before using it in
    file operations. An authenticated, remote attacker can
    exploit this issue, via a specially crafted request that
    uses path traversal, to upload arbitrary files, which
    can then be used to execute arbitrary code.
    (CVE-2017-5793)

  - A flaw exists in FileUploadServlet due to improper
    sanitization of user-supplied input before using it in
    file operations. An authenticated, remote attacker can
    exploit this issue, via a specially crafted request that
    uses path traversal, to upload arbitrary files, which
    then can be used to execute arbitrary code.
    (CVE-2017-5794)

  - A flaw exists in FileDownloadServlet due to improper
    sanitization of user-supplied input to the 'fileName'
    parameter before using it in file operations. An
    authenticated, remote attacker can exploit this issue,
    via a specially crafted request that uses path
    traversal, to disclose the content of arbitrary files.
    (CVE-2017-5795)");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03714en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bca21dc8");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03715en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d846d714");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03716en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4cd43fa7");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03717en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0a25071d");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-17-161/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-17-163/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-17-164/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-17-165/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to HPE Intelligent Management Center version 7.3 E0504P02 or
later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-5791");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/03/07");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/03/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/28");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:intelligent_management_center");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2017-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("hp_imc_detect.nbin");
  script_require_ports("Services/activemq", 61616);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

# Figure out which port to use
port = get_service(svc:'activemq', default:61616, exit_on_fail:TRUE);
version = get_kb_item_or_exit('hp/hp_imc/'+port+'/version');

# Only 7.2-E0403P06 is affected, according to HP advisories
if (toupper(version) != "7.2-E0403P06")
  audit(AUDIT_LISTEN_NOT_VULN, 'HP Intelligent Management Center', port, version);

report =
  '\n  Installed version : ' + version +
  '\n  Fixed version     : 7.3-E0504P02' +
  '\n';
security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
VendorProductVersionCPE
hpintelligent_management_centercpe:/a:hp:intelligent_management_center

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.704 High

EPSS

Percentile

98.0%

Related for HP_IMC_73_E0504P02.NASL