|
|
|
HPE System Management Homepage Multiple Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Local and Remote Users Deny Service, and Local Users Gain Elevated Privileges
|
SecurityTracker Alert ID: 1039437 |
SecurityTracker URL: http://securitytracker.com/id/1039437
|
CVE Reference:
CVE-2017-12544, CVE-2017-12545, CVE-2017-12546, CVE-2017-12547, CVE-2017-12548, CVE-2017-12549, CVE-2017-12550, CVE-2017-12551, CVE-2017-12552, CVE-2017-12553
(Links to External Site)
|
Date: Sep 27 2017
|
Impact:
Denial of service via local system, Denial of service via network, Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via local system, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
Multiple vulnerabilities were reported in HPE System Management Homepage. A remote or local user can cause denial of service conditions on the target system. A remote user can conduct cross-site scripting attacks. A local user can obtain elevated privileges on the target system. A local user can bypass authentication.
A local user can trigger a buffer overflow to execute arbitrary code on the target system [CVE-2017-12546].
A local user can execute arbitrary commands on the target system [CVE-2017-12547, CVE-2017-12548, CVE-2017-12551, CVE-2017-12552].
A remote user can cause denial of service conditions on the target system [CVE-2017-12545].
A security configuration error may occur, affecting system integrity and availability [CVE-2017-12550].
A local user can execute arbitrary commands on the target system with elevated privileges.
A local user can bypass authentication on the target system [CVE-2017-12549, CVE-2017-12553].
The software does not properly filter HTML code from user-supplied input before displaying the input [CVE-2017-12544]. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the HPE System Management Homepage software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
|
Impact:
A local user can obtain elevated privileges on the target system.
A remote or local user can cause denial of service conditions.
A local user can obtain elevated privileges on the target system.
A local user can bypass authentication on the target system.
A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the HPE System Management Homepage software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
|
Solution:
HPE has issued a fix (7.6.1).
The HPE advisory is available at:
http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbmu03753en_us
|
Vendor URL: h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbmu03753en_us (Links to External Site)
|
Cause:
Access control error, Boundary error, Configuration error, Input validation error
|
Underlying OS: Linux (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=hpesbmu03753en_us
|
|
|
Go to the Top of This SecurityTracker Archive Page
|