HP SiteScope Multiple Vulnerabilities (HPESBGN03763)
2017-07-06T00:00:00
ID HP_SITESCOPE_HPESBGN03763.NASL Type nessus Reporter This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
The version of HP SiteScope running on the remote host is 11.2x or
11.3x. It is, therefore, affected by multiple vulnerabilities :
A cryptographic weakness exists in the ss_pu.jar library
due to the use of hard-coded encryption keys. A local
attacker can exploit this to disclose potentially
sensitive information, such as user credentials in
configuration files. (CVE-2017-8949)
A cryptographic weakness exists in the ss_pu.jar
library due to the use of risky or broken cryptographic
algorithms. A local attacker can exploit this to
disclose potentially sensitive information, such as
user credentials in configuration files. (CVE-2017-8950)
An information disclosure vulnerability exists due to
credentials stored in Credential Profiles being passed
in cleartext over HTTP to the client. A local attacker
can exploit this to disclose sensitive information.
(CVE-2017-8951)
A remote code execution vulnerability exists due to
improper authentication of users before allowing file
access when handling SOAP calls to the SiteScope
service. An unauthenticated, remote attacker can exploit
this to perform unauthorized actions, such as the
disclosure of arbitrary files or the execution of
arbitrary code. (CVE-2017-8952)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(101299);
script_version("1.7");
script_cvs_date("Date: 2019/11/12");
script_cve_id(
"CVE-2017-8949",
"CVE-2017-8950",
"CVE-2017-8951",
"CVE-2017-8952"
);
script_bugtraq_id(99331, 99333);
script_xref(name:"HP", value:"HPESBGN03763");
script_xref(name:"HP", value:"emr_na-hpesbgn03763en_us");
script_xref(name:"CERT", value:"768399");
script_xref(name:"ZDI", value:"ZDI-12-176");
script_xref(name:"IAVA", value:"2017-A-0194");
script_name(english:"HP SiteScope Multiple Vulnerabilities (HPESBGN03763)");
script_summary(english:"Checks the version of HP SiteScope.");
script_set_attribute(attribute:"synopsis", value:
"A web application running on the remote host is affected by a multiple
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of HP SiteScope running on the remote host is 11.2x or
11.3x. It is, therefore, affected by multiple vulnerabilities :
- A cryptographic weakness exists in the ss_pu.jar library
due to the use of hard-coded encryption keys. A local
attacker can exploit this to disclose potentially
sensitive information, such as user credentials in
configuration files. (CVE-2017-8949)
- A cryptographic weakness exists in the ss_pu.jar
library due to the use of risky or broken cryptographic
algorithms. A local attacker can exploit this to
disclose potentially sensitive information, such as
user credentials in configuration files. (CVE-2017-8950)
- An information disclosure vulnerability exists due to
credentials stored in Credential Profiles being passed
in cleartext over HTTP to the client. A local attacker
can exploit this to disclose sensitive information.
(CVE-2017-8951)
- A remote code execution vulnerability exists due to
improper authentication of users before allowing file
access when handling SOAP calls to the SiteScope
service. An unauthenticated, remote attacker can exploit
this to perform unauthorized actions, such as the
disclosure of arbitrary files or the execution of
arbitrary code. (CVE-2017-8952)");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-176/");
script_set_attribute(attribute:"see_also", value:"https://www.kb.cert.org/vuls/id/768399/");
# https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4843ab92");
# https://www.rapid7.com/db/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c83286c6");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate update according to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-8952");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/27");
script_set_attribute(attribute:"patch_publication_date", value:"2017/06/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/06");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:sitescope");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("hp_sitescope_detect.nasl");
script_require_keys("installed_sw/sitescope", "Settings/ParanoidReport");
script_require_ports("Services/www", 8080);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");
if(report_paranoia < 2) audit(AUDIT_PARANOID);
appname = "sitescope";
# Stops get_http_port from branching
get_install_count(app_name:appname, exit_if_zero:TRUE);
port = get_http_port(default:8080);
install = get_single_install(app_name:appname,port:port,exit_if_unknown_ver:TRUE);
version = install['version']; # Version level always at least Major.Minor.SP
url = install['path' ];
url = build_url(port:port,qs:url);
if (version =~ "^11\.[23][0-9]" && report_paranoia >= 2)
{
if (report_verbosity > 0)
{
report =
'\n URL : ' + url +
'\n Installed version : ' + version +
'\n';
security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
}
else security_warning(port);
exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, url, version);
{"id": "HP_SITESCOPE_HPESBGN03763.NASL", "bulletinFamily": "scanner", "title": "HP SiteScope Multiple Vulnerabilities (HPESBGN03763)", "description": "The version of HP SiteScope running on the remote host is 11.2x or\n11.3x. It is, therefore, affected by multiple vulnerabilities :\n\n - A cryptographic weakness exists in the ss_pu.jar library\n due to the use of hard-coded encryption keys. A local\n attacker can exploit this to disclose potentially\n sensitive information, such as user credentials in\n configuration files. (CVE-2017-8949)\n\n - A cryptographic weakness exists in the ss_pu.jar\n library due to the use of risky or broken cryptographic\n algorithms. A local attacker can exploit this to\n disclose potentially sensitive information, such as\n user credentials in configuration files. (CVE-2017-8950)\n\n - An information disclosure vulnerability exists due to\n credentials stored in Credential Profiles being passed\n in cleartext over HTTP to the client. A local attacker\n can exploit this to disclose sensitive information.\n (CVE-2017-8951)\n\n - A remote code execution vulnerability exists due to\n improper authentication of users before allowing file\n access when handling SOAP calls to the SiteScope\n service. An unauthenticated, remote attacker can exploit\n this to perform unauthorized actions, such as the\n disclosure of arbitrary files or the execution of\n arbitrary code. (CVE-2017-8952)", "published": "2017-07-06T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/101299", "reporter": "This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://www.kb.cert.org/vuls/id/768399/", "http://www.nessus.org/u?c83286c6", "http://www.nessus.org/u?4843ab92", "https://www.zerodayinitiative.com/advisories/ZDI-12-176/"], "cvelist": ["CVE-2017-8949", "CVE-2017-8951", "CVE-2017-8952", "CVE-2017-8950"], "type": "nessus", "lastseen": "2021-01-01T03:15:38", "edition": 28, "viewCount": 15, "enchantments": {"dependencies": {"references": [{"type": "cert", "idList": ["VU:768399"]}, {"type": "cve", "idList": ["CVE-2017-8951", "CVE-2017-8949", "CVE-2017-8952", "CVE-2017-8950"]}, {"type": "zdi", "idList": ["ZDI-12-176"]}], "modified": "2021-01-01T03:15:38", "rev": 2}, "score": {"value": 5.3, "vector": "NONE", "modified": "2021-01-01T03:15:38", "rev": 2}, "vulnersScore": 5.3}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(101299);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\n \"CVE-2017-8949\",\n \"CVE-2017-8950\",\n \"CVE-2017-8951\",\n \"CVE-2017-8952\"\n );\n script_bugtraq_id(99331, 99333);\n script_xref(name:\"HP\", value:\"HPESBGN03763\");\n script_xref(name:\"HP\", value:\"emr_na-hpesbgn03763en_us\");\n script_xref(name:\"CERT\", value:\"768399\");\n script_xref(name:\"ZDI\", value:\"ZDI-12-176\");\n script_xref(name:\"IAVA\", value:\"2017-A-0194\");\n\n script_name(english:\"HP SiteScope Multiple Vulnerabilities (HPESBGN03763)\");\n script_summary(english:\"Checks the version of HP SiteScope.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A web application running on the remote host is affected by a multiple\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of HP SiteScope running on the remote host is 11.2x or\n11.3x. It is, therefore, affected by multiple vulnerabilities :\n\n - A cryptographic weakness exists in the ss_pu.jar library\n due to the use of hard-coded encryption keys. A local\n attacker can exploit this to disclose potentially\n sensitive information, such as user credentials in\n configuration files. (CVE-2017-8949)\n\n - A cryptographic weakness exists in the ss_pu.jar\n library due to the use of risky or broken cryptographic\n algorithms. A local attacker can exploit this to\n disclose potentially sensitive information, such as\n user credentials in configuration files. (CVE-2017-8950)\n\n - An information disclosure vulnerability exists due to\n credentials stored in Credential Profiles being passed\n in cleartext over HTTP to the client. A local attacker\n can exploit this to disclose sensitive information.\n (CVE-2017-8951)\n\n - A remote code execution vulnerability exists due to\n improper authentication of users before allowing file\n access when handling SOAP calls to the SiteScope\n service. An unauthenticated, remote attacker can exploit\n this to perform unauthorized actions, such as the\n disclosure of arbitrary files or the execution of\n arbitrary code. (CVE-2017-8952)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.zerodayinitiative.com/advisories/ZDI-12-176/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.kb.cert.org/vuls/id/768399/\");\n # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03763en_us\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4843ab92\");\n # https://www.rapid7.com/db/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c83286c6\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate update according to the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-8952\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/07/06\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:hp:sitescope\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"hp_sitescope_detect.nasl\");\n script_require_keys(\"installed_sw/sitescope\", \"Settings/ParanoidReport\");\n script_require_ports(\"Services/www\", 8080);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"install_func.inc\");\n\n\nif(report_paranoia < 2) audit(AUDIT_PARANOID);\n\nappname = \"sitescope\";\n# Stops get_http_port from branching\nget_install_count(app_name:appname, exit_if_zero:TRUE);\n\nport = get_http_port(default:8080);\ninstall = get_single_install(app_name:appname,port:port,exit_if_unknown_ver:TRUE);\nversion = install['version']; # Version level always at least Major.Minor.SP\nurl = install['path' ];\nurl = build_url(port:port,qs:url);\n\nif (version =~ \"^11\\.[23][0-9]\" && report_paranoia >= 2)\n{\n if (report_verbosity > 0)\n {\n\n report =\n '\\n URL : ' + url +\n '\\n Installed version : ' + version +\n '\\n';\n security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);\n }\n else security_warning(port);\n exit(0);\n}\nelse audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, url, version); \n", "naslFamily": "CGI abuses", "pluginID": "101299", "cpe": ["cpe:/a:hp:sitescope"], "scheme": null, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}}
{"cert": [{"lastseen": "2020-09-18T20:42:04", "bulletinFamily": "info", "cvelist": ["CVE-2017-8949", "CVE-2017-8950", "CVE-2017-8951", "CVE-2017-8952"], "description": "### Overview \n\nHPE's SiteScope is vulnerable to several cryptographic issues, insufficiently protected credentials, and missing authentication.\n\n### Description \n\nHPE's SiteScope is vulnerable to several vulnerabilities. The researcher reports that version 11.31.461 is affected; other versions may also be impacted. CERT/CC has not received further information on affected versions from HPE.\n\n[**CWE-306**](<http://cwe.mitre.org/data/definitions/306.html>)**: Missing Authentication for Critical Function - **CVE-2017-8952 \n \nPreviously reported as [ZDI-12-176](<http://www.zerodayinitiative.com/advisories/ZDI-12-176/>) in 2012, SiteScope version 11.31.461 and possibly other versions do not properly authenticate users before allowing file access. Successful exploits allows attackers to bypass security restrictions and to perform unauthorized actions such as downloading arbitrary files from the system. A [Metasploit module](<https://www.rapid7.com/db/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess>) `hp_sitescope_getfileinternal_access` released in 2012 is confirmed by the reporter to still work against version 11.31.461. \n \n[**CWE-321**](<http://cwe.mitre.org/data/definitions/321.html>)**: Use of Hard-coded Cryptographic Key - **CVE-2017-8949 \n \nSiteScope version 11.31.461 and possibly other versions contains hardcoded encryption keys in the `ss_pu.jar` library allowing attackers to decrypt sensitive data such as the user credentials contained in configuration files. \n \n[**CWE-327**](<http://cwe.mitre.org/data/definitions/327.html>)**: Use of a Broken or Risky Cryptographic Algorithm - **CVE-2017-8950 \n \nSiteScope version 11.31.461 and possibly other versions in some cases uses custom cryptographic functions (e.g., `OldEncryptionHandler` in `ss_pu.jar`) to protect sensitive data such as credentials contained in configuration files. For example, the `_httpSecureKeyPassword` and `_httpSecureKeystorePassword` configuration items located in `master.config` are encrypted with the `OldEncryptionHandler` in some cases. \n \n[**CWE-522**](<http://cwe.mitre.org/data/definitions/522.html>)**: Insufficiently Protected Credentials - **CVE-2017-8951 \n \nSiteScope version 11.31.461 and possibly other versions passes credentials stored in Credential Profiles in plaintext back to the client over HTTP. \n \nThe researcher has published a [blog post](<http://bytesdarkly.com/disclosures/2017/06/exploiting-hp-sitescope-from-zero-to-compromise.html>) about these issues. HPE has also released an [advisory](<http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbgn03763en_us>) as of 2017 June 27. \n \nThe CVSS score below is based on hard-coded cryptographic key. \n \n--- \n \n### Impact \n\nAn unauthenticated, remote attacker may be able to access arbitrary files from the system running SiteScope, or obtain credentials to SiteScope. \n \n--- \n \n### Solution \n\n**Apply an update** \n \nHPE has released updated and mitigation advice in a [security advisory](<http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbgn03763en_us>) dated 2017 June 27. Affected users are encouraged to apply all available updates and follow HPE's recommended mitigations. \n \n**Disable old APIs** \n \nAccording to HPE, for SiteScope version 11.24 IP7 and onwards, administrators may set an undocumented flag called \"`_disableOldAPIs=true`\" that can be set in the \"`groups/master.config`\" file. Setting this flag will prevent unauthenticated services from being executed. \n \n**Enable key management** \n \nAccording to HPE, the hardcoded keys **(**CVE-2017-8949) are used for backward compatibility and obfuscation. For encryption, Key Management can be enabled which will mitigate this vulnerability. For enabling Key Management please refer _SiteScope Deployment Guide - Chapter 20: Configuring SiteScope to Use a Custom Key for Data Encryption_. \n \nAccording to HPE, `ss_pu.jar` (CVE-2017-8950) contains only obfuscation keys and those keys are not used for encryption. Customizable cryptographic keys are generated during key management. Encryption is done by key management in SiteScope. Please refer _SiteScope Deployment Guide - Chapter 20: Configuring SiteScope to Use a Custom Key for Data Encryption_. \n \nAccording to HPE, the CVE-2017-8951 vulnerability is expected to have an update in Q3 2017. The following workarounds may help mitigate these issues. \n \n--- \n \n**Require TLS/SSL** \n \nEnsure that the system using SiteScope requires TLS/SSL for access to mitigate the insufficiently protected credentials. \n \n**Restrict access** \n \nRestrict network access to SiteScope systems to trusted and authorized hosts and networks. Separate management networks from general purpose user networks. Do not allow access from untrusted networks such as the internet. \n \n--- \n \n### Vendor Information\n\n768399\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### Hewlett Packard Enterprise Affected\n\nNotified: April 24, 2017 Updated: June 13, 2017 \n\n**Statement Date: June 07, 2017**\n\n### Status\n\nAffected\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nWe are not aware of further vendor information regarding this vulnerability.\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | 7.8 | AV:N/AC:L/Au:N/C:C/I:N/A:N \nTemporal | 7 | E:F/RL:W/RC:C \nEnvironmental | 5.3 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND \n \n \n\n\n### References \n\n * <http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbgn03763en_us>\n * <http://bytesdarkly.com/disclosures/2017/06/exploiting-hp-sitescope-from-zero-to-compromise.html>\n * <http://www.zerodayinitiative.com/advisories/ZDI-12-176/>\n * <https://www.rapid7.com/db/modules/auxiliary/scanner/http/hp_sitescope_getfileinternal_fileaccess>\n * <http://cwe.mitre.org/data/definitions/306.html>\n * <http://cwe.mitre.org/data/definitions/321.html>\n * <http://cwe.mitre.org/data/definitions/327.html>\n * <http://cwe.mitre.org/data/definitions/522.html>\n\n### Acknowledgements\n\nThanks to Richard Kelley for reporting this vulnerability.\n\nThis document was written by Garret Wassermann.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2017-8952](<http://web.nvd.nist.gov/vuln/detail/CVE-2017-8952>), [CVE-2017-8949](<http://web.nvd.nist.gov/vuln/detail/CVE-2017-8949>), [CVE-2017-8950](<http://web.nvd.nist.gov/vuln/detail/CVE-2017-8950>), [CVE-2017-8951](<http://web.nvd.nist.gov/vuln/detail/CVE-2017-8951>) \n---|--- \n**Date Public:** | 2017-06-13 \n**Date First Published:** | 2017-06-13 \n**Date Last Updated: ** | 2017-06-29 18:47 UTC \n**Document Revision: ** | 56 \n", "modified": "2017-06-29T18:47:00", "published": "2017-06-13T00:00:00", "id": "VU:768399", "href": "https://www.kb.cert.org/vuls/id/768399", "type": "cert", "title": "HPE SiteScope contains multiple vulnerabilities", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "cve": [{"lastseen": "2020-10-03T13:07:50", "description": "A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.", "edition": 3, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-02-15T22:29:00", "title": "CVE-2017-8951", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8951"], "modified": "2018-03-06T19:10:00", "cpe": ["cpe:/a:hp:sitescope:11.33", "cpe:/a:hp:sitescope:11.20", "cpe:/a:hp:sitescope:11.32", "cpe:/a:hp:sitescope:11.24.391", "cpe:/a:hp:sitescope:11.21", "cpe:/a:hp:sitescope:11.22", "cpe:/a:hp:sitescope:11.24", "cpe:/a:hp:sitescope:11.31", "cpe:/a:hp:sitescope:11.30.521", "cpe:/a:hp:sitescope:11.30", "cpe:/a:hp:sitescope:11.23"], "id": "CVE-2017-8951", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8951", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.22:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.23:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:07:50", "description": "A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.", "edition": 3, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-02-15T22:29:00", "title": "CVE-2017-8950", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8950"], "modified": "2018-03-06T19:04:00", "cpe": ["cpe:/a:hp:sitescope:11.33", "cpe:/a:hp:sitescope:11.20", "cpe:/a:hp:sitescope:11.32", "cpe:/a:hp:sitescope:11.24.391", "cpe:/a:hp:sitescope:11.21", "cpe:/a:hp:sitescope:11.22", "cpe:/a:hp:sitescope:11.24", "cpe:/a:hp:sitescope:11.31", "cpe:/a:hp:sitescope:11.30.521", "cpe:/a:hp:sitescope:11.30", "cpe:/a:hp:sitescope:11.23"], "id": "CVE-2017-8950", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8950", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.22:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.23:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:07:50", "description": "A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-02-15T22:29:00", "title": "CVE-2017-8949", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8949"], "modified": "2019-10-03T00:03:00", "cpe": ["cpe:/a:hp:sitescope:11.33", "cpe:/a:hp:sitescope:11.20", "cpe:/a:hp:sitescope:11.32", "cpe:/a:hp:sitescope:11.24.391", "cpe:/a:hp:sitescope:11.21", "cpe:/a:hp:sitescope:11.22", "cpe:/a:hp:sitescope:11.24", "cpe:/a:hp:sitescope:11.31", "cpe:/a:hp:sitescope:11.30.521", "cpe:/a:hp:sitescope:11.30", "cpe:/a:hp:sitescope:11.23"], "id": "CVE-2017-8949", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8949", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.22:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.23:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T13:07:50", "description": "A Disclosure of Sensitive Information vulnerability in HPE SiteScope version v11.2x, v11.3x was found.", "edition": 3, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-02-15T22:29:00", "title": "CVE-2017-8952", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-8952"], "modified": "2018-03-06T19:41:00", "cpe": ["cpe:/a:hp:sitescope:11.33", "cpe:/a:hp:sitescope:11.20", "cpe:/a:hp:sitescope:11.32", "cpe:/a:hp:sitescope:11.24.391", "cpe:/a:hp:sitescope:11.21", "cpe:/a:hp:sitescope:11.22", "cpe:/a:hp:sitescope:11.24", "cpe:/a:hp:sitescope:11.31", "cpe:/a:hp:sitescope:11.30.521", "cpe:/a:hp:sitescope:11.30", "cpe:/a:hp:sitescope:11.23"], "id": "CVE-2017-8952", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8952", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:hp:sitescope:11.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.22:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.21:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.30.521:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.23:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.32:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.31:*:*:*:*:*:*:*", "cpe:2.3:a:hp:sitescope:11.24.391:*:*:*:*:*:*:*"]}]}