BMC Server Automation RSCD Agent Weak ACL NSH Arbitrary Command Execution

Critical Nessus Plugin ID 91947

Synopsis

The RSCD agent running on the remote host is affected by a remote
command execution vulnerability.

Description

The BMC Server Automation RSCD agent running on the remote host is
configured in such a manner as to publicly expose an API that can be
used for unrestricted command execution. An unauthenticated, remote
attacker can exploit this, via the NSH protocol, to execute arbitrary
commands.

Solution

Update the exports file to restrict access to the interface.

See Also

http://www.bmc.com/it-solutions/truesight-server-automation.html

https://docs.bmc.com/docs/ServerAutomation/88/home-641429516.html

http://www.nessus.org/u?a5bac314

Plugin Details

Severity: Critical

ID: 91947

File Name: bmc_rscd_nsh_acl_check.nbin

Version: 1.60

Type: remote

Family: Misc.

Published: 2016/07/05

Modified: 2019/02/13

Dependencies: 91000

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:bmc:bladelogic_server_automation_rscd_agent

Exploited by Nessus: true