Dell iDRAC6 / iDRAC7 / iDRAC8 Path Traversal Authentication Bypass

high Nessus Plugin ID 90265

Synopsis

The remote device is affected by a path traversal vulnerability that allows an authentication bypass.

Description

The remote Dell Remote Access Controller (iDRAC6 / iDRAC7 / iDRAC8) is affected by a path traversal vulnerability. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to bypass authentication and gain privileged access to the iDRAC controller.

Note that the application is also reportedly affected by several additional vulnerabilities, including a format string vulnerability, an SSH authentication issue with usernames larger than 62 characters, SSH shell buffer overflows, and an unspecified XML external entity (XXE) vulnerability; however, Nessus has not tested for these additional issues.

Solution

Upgrade to firmware version 2.80 (iDRAC6) / 2.21.21.21 (iDRAC7 and iDRAC8) or later.

See Also

http://en.community.dell.com/techcenter/extras/m/white_papers/20441859

Plugin Details

Severity: High

ID: 90265

File Name: drac_traversal_auth_bypass.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 4/1/2016

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-7270

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:dell:idrac6_firmware, cpe:/o:dell:idrac7_firmware, x-cpe:/o:dell:idrac8_firmware

Required KB Items: installed_sw/iDRAC

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 11/9/2015

Vulnerability Publication Date: 12/2/2015

Reference Information

CVE: CVE-2015-7270