NetIQ Privileged User Manager Password Change Authentication Bypass (intrusive check)

medium Nessus Plugin ID 62991

Synopsis

The remote host is running a web application affected by an authentication bypass vulnerability.

Description

Nessus was able to change the password for the 'admin' user of the NetIQ Privileged User Manager web application without authenticating, via a specially crafted POST request.

Solution

Apply NetIQ Privileged User Manager 2.3.1 HF2 (2.3.1-2) or later.

See Also

http://retrogod.altervista.org/9sg_novell_netiq_i_adv.htm

https://support.microfocus.com/kb/doc.php?id=7011385

Plugin Details

Severity: Medium

ID: 62991

File Name: netiq_pum_passwd_change.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 11/21/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2012-5930

Vulnerability Information

CPE: cpe:/a:netiq:privileged_user_manager

Required KB Items: www/netiq_pum

Excluded KB Items: Settings/disable_cgi_scanning, global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 11/20/2012

Vulnerability Publication Date: 11/15/2012

Exploitable With

Elliot (Novell NetIQ 2.3.1 RCE)

Reference Information

CVE: CVE-2012-5930

BID: 56535