HP System Management Homepage SetSMHData admin-group Parameter Handling RCE
Critical Nessus Plugin ID 94673
SynopsisThe remote web server is affected by a remote code execution
DescriptionThe HP System Management Homepage (SMH) running on the remote host is
affected by a remote code execution vulnerability due to an overflow
condition in the mod_smh_config.so library caused by improper
validation of user-supplied input when parsing the admin-group
parameter supplied to the /proxy/SetSMHData endpoint. An
unauthenticated, remote attacker can exploit this, via a specially
crafted request, to cause a denial of service condition or the
execution of arbitrary code.
Note that HP SMH is reportedly affected by additional vulnerabilities; however,
this plugin has not tested for them.
SolutionUpgrade to HP System Management Homepage (SMH) version 7.6 or later.