H3C / HPE Intelligent Management Center accessMgrServlet Java Object Deserialization RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

A web application hosted on the remote web server is affected by a
remote code execution vulnerability.

Description :

The H3C or HPE Intelligent Management Center (iMC) web server running
on the remote host is affected by a remote code execution
vulnerability in accessMgrServlet due to unsafe deserialization of
Java objects to various libraries. An unauthenticated, remote attacker
can exploit this, by sending a specially crafted HTTP request, to
execute arbitrary code on the target host.

Note that Intelligent Management Center (iMC) is an HPE product;
however, it is branded as H3C.

See also :

http://www.nessus.org/u?c5379b72
http://www.nessus.org/u?e0204f30
http://www.nessus.org/u?7cc45126
http://www.zerodayinitiative.com/advisories/ZDI-17-166/

Solution :

Upgrade to H3C / HPE iMC version 7.2 E0504 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Misc.

Nessus Plugin ID: 99729 ()

Bugtraq ID: 96755

CVE ID: CVE-2017-5790

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now