The version of HP Systems Insight Manager installed on the remote Windows host is affected by vulnerabilities in the following components :
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(59684);
script_version("1.20");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/03/08");
script_cve_id(
"CVE-2009-3555",
"CVE-2010-2227",
"CVE-2010-4470",
"CVE-2010-4476",
"CVE-2011-0611",
"CVE-2011-0786",
"CVE-2011-0788",
"CVE-2011-0802",
"CVE-2011-0814",
"CVE-2011-0815",
"CVE-2011-0817",
"CVE-2011-0862",
"CVE-2011-0863",
"CVE-2011-0864",
"CVE-2011-0865",
"CVE-2011-0866",
"CVE-2011-0867",
"CVE-2011-0868",
"CVE-2011-0869",
"CVE-2011-0871",
"CVE-2011-0872",
"CVE-2011-0873",
"CVE-2011-2092",
"CVE-2011-2093",
"CVE-2011-2130",
"CVE-2011-2134",
"CVE-2011-2135",
"CVE-2011-2136",
"CVE-2011-2137",
"CVE-2011-2138",
"CVE-2011-2139",
"CVE-2011-2140",
"CVE-2011-2414",
"CVE-2011-2415",
"CVE-2011-2416",
"CVE-2011-2417",
"CVE-2011-2425",
"CVE-2011-2426",
"CVE-2011-2427",
"CVE-2011-2428",
"CVE-2011-2429",
"CVE-2011-2430",
"CVE-2011-2444",
"CVE-2011-2445",
"CVE-2011-2450",
"CVE-2011-2451",
"CVE-2011-2452",
"CVE-2011-2453",
"CVE-2011-2454",
"CVE-2011-2455",
"CVE-2011-2456",
"CVE-2011-2457",
"CVE-2011-2458",
"CVE-2011-2459",
"CVE-2011-2460",
"CVE-2011-2461",
"CVE-2011-3556",
"CVE-2011-3557",
"CVE-2011-3558",
"CVE-2012-1995",
"CVE-2012-1996",
"CVE-2012-1997",
"CVE-2012-1998",
"CVE-2012-1999"
);
script_bugtraq_id(
36935,
41544,
42817,
46091,
46387,
47314,
48133,
48134,
48135,
48136,
48137,
48138,
48139,
48140,
48141,
48142,
48143,
48144,
48145,
48146,
48147,
48148,
48149,
48267,
48279,
49073,
49074,
49075,
49076,
49077,
49079,
49080,
49081,
49082,
49083,
49084,
49085,
49086,
49710,
49714,
49715,
49716,
49717,
49718,
50618,
50619,
50620,
50621,
50622,
50623,
50624,
50625,
50626,
50627,
50628,
50629,
50869,
53315
);
script_xref(name:"HP", value:"HPSBMU02769");
script_xref(name:"HP", value:"SSRT100846");
script_xref(name:"HP", value:"SSRT100093");
script_xref(name:"HP", value:"SSRT090028");
script_xref(name:"HP", value:"SSRT100110");
script_xref(name:"HP", value:"SSRT100373");
script_xref(name:"HP", value:"SSRT100426");
script_xref(name:"HP", value:"SSRT100514");
script_xref(name:"HP", value:"SSRT100562");
script_xref(name:"HP", value:"SSRT100639");
script_xref(name:"HP", value:"SSRT100702");
script_xref(name:"HP", value:"SSRT100819");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/03/24");
script_name(english:"HP Systems Insight Manager < 7.0 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains software that is affected by multiple
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of HP Systems Insight Manager installed on the remote
Windows host is affected by vulnerabilities in the following
components :
- TLS and SSL protocols
- Apache Tomcat
- Java
- Flash Player
- BlazeDS/GraniteDS
- Adobe LiveCycle
- Adobe Flex SDK
- Systems Insight Manager");
# http://web.archive.org/web/20120701193341/http://h20000.www2.hp.com:80/bizsupport/TechSupport/Document.jsp?objectID=c03298151
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?72e42ec4");
script_set_attribute(attribute:"solution", value:
"Upgrade to HP Systems Insight Manager 7.0 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2011-2460");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Java RMI Server Insecure Default Configuration Java Code Execution');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_cwe_id(310);
script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/09");
script_set_attribute(attribute:"patch_publication_date", value:"2012/04/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:systems_insight_manager");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2012-2022 Tenable Network Security, Inc.");
script_dependencies("hp_systems_insight_manager_installed.nasl");
script_require_keys("installed_sw/HP Systems Insight Manager");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("install_func.inc");
include("misc_func.inc");
app_name = "HP Systems Insight Manager";
get_install_count(app_name:app_name, exit_if_zero:TRUE);
install = get_single_install(app_name:app_name);
path = install['path'];
version = install['version'];
if (version =~ '^(([A-Z]\\.)?0[0-5]\\.|([A-C]\\.)?0[0-6]\\.[0-9\\.]+)')
{
set_kb_item(name:'www/0/XSS', value:TRUE);
set_kb_item(name:'www/0/XSRF', value:TRUE);
port = get_kb_item('SMB/transport');
if (!port) port = 445;
if (report_verbosity > 0)
{
report =
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : C.07.00.00.00' +
'\n';
security_hole(port:port, extra:report);
}
else security_hole(port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);
Vendor | Product | Version | CPE |
---|---|---|---|
hp | systems_insight_manager | cpe:/a:hp:systems_insight_manager |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0611
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0786
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0863
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0864
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0865
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0867
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0868
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0869
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0871
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0872
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0873
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2092
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2093
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2130
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2135
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2136
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2137
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2138
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2140
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2414
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2415
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2416
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2417
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2425
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2426
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2428
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2430
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2454
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2458
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3558
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1999
www.nessus.org/u?72e42ec4