HP AutoPass License Server Remote Code Execution (HPSBMU03045)

critical Nessus Plugin ID 76284

Synopsis

The remote host is affected by a remote code execution vulnerability.

Description

The HP AutoPass License Server has a flaw in the 'CommunicationServlet' that allows a remote, unauthenticated attackers to place files at arbitrary locations on the system by utilizing a directory traversal string. A remote attacker could use this issue to execute arbitrary code with 'SYSTEM' privileges.

Solution

Apply the appropriate patch per the vendor's advisory.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-14-195/

http://www.nessus.org/u?41f0a021

Plugin Details

Severity: Critical

ID: 76284

File Name: hp_autopass_hpsbmu03045.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 6/27/2014

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/a:hp:autopass_license_server

Required KB Items: www/hp_autopass

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 6/10/2014

Vulnerability Publication Date: 6/10/2014

Exploitable With

Core Impact

Metasploit (HP AutoPass License Server File Upload)

Reference Information

CVE: CVE-2013-6221

BID: 67989

HP: HPSBMU03045