HP Intelligent Management Center Java Object Deserialization RCE

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A web application hosted on the remote web server is affected by a
remote code execution vulnerability.

Description :

The version of HP Intelligent Management Center (IMC) installed on the
remote Windows host is prior to 7.2. It is, therefore, affected by a
remote code execution vulnerability due to unsafe deserialize calls of
unauthenticated Java objects to the Apache Commons Collections (ACC)
library. An unauthenticated, remote attacker can exploit this, by
sending a crafted HTTP request, to execute arbitrary code on the
target host.

See also :

http://www.nessus.org/u?b3565148
http://www.nessus.org/u?9c6d83db

Solution :

Upgrade to HP IMC version 7.2 E0403P04 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 93097 ()

Bugtraq ID: 91739

CVE ID: CVE-2016-4372

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now