Lucene search

K
zdiCarlos Perez at Tenable Network SecurityZDI-12-015
HistoryJan 12, 2012 - 12:00 a.m.

(0Day) HP StorageWorks P2000 G3 Directory Traversal and Default Account Vulnerabilities

2012-01-1200:00:00
Carlos Perez at Tenable Network Security
www.zerodayinitiative.com
755

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.084 Low

EPSS

Percentile

94.4%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP MSA 2000 G3. Authentication is not required to exploit this vulnerability. The specific flaws exists within the web interface listening on TCP port 80. There exists a directory traversal flaw that can allow a remote attacker to view any file on the system by simply specifying it in the default URI. Additionally, the pasword file contains a default login that can be used to authenticate to the device. This can be leveraged by a remote attacker to perform any tasks an administrator is able to.

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.084 Low

EPSS

Percentile

94.4%