IBM Spectrum Protect Plus hostname Command Injection

Critical Nessus Plugin ID 139330

Synopsis

A web application running on the remote host is affected by a remote code execution vulnerability.

Description

The IBM Spectrum Protect Plus (SPP) administrative console running on the remote host is affected by a remote command injection vulnerability due to improper validation of user-supplied data when processing a 'set hostname' HTTP request. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request, to execute arbitrary code on the system with root privileges.

Note that this plugin does not flag SPP 10.1.5 build 2218 having the spp-emi-10.1.5-227 RPM package as vulnerable because it partially fixed the vulnerabilities by enabling authentication for URL /emi/api/hostname. A full fix is in spp-emi-10.1.6-21 in SPP 10.1.6 build 1974, which performs additional checking on the hostname parameter in the HTTP request to prevent authenticated command injection.

Also note that the application is reportedly affected by other vulnerabilities; however, this plugin has not tested for those issues.

Solution

Update the IBM Spectrum Protect Plus RPM package spp-emi to 10.1.6-21 or later. That spp-emi package should be in the IBM Spectrum Protect Plus 10.1.6 build 1974.

See Also

https://www.ibm.com/support/pages/node/6221358

Plugin Details

Severity: Critical

ID: 139330

File Name: ibm_spp_cve-2020-4469.nasl

Version: 1.2

Type: remote

Family: General

Published: 2020/08/05

Updated: 2020/08/07

Dependencies: 135853

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2020-4469

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:spectrum_protect_plus

Required KB Items: installed_sw/IBM Spectrum Protect Plus Administrative Console

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/06/12

Vulnerability Publication Date: 2020/06/12

Reference Information

CVE: CVE-2020-4211, CVE-2020-4469

ZDI: ZDI-20-273

TRA: TRA-2020-37