HP System Management Homepage SetSMHData admin-group Parameter Handling RCE
High Nessus Plugin ID 94673
SynopsisThe remote web server is affected by a remote code execution vulnerability.
DescriptionThe HP System Management Homepage (SMH) running on the remote host is affected by a remote code execution vulnerability due to an overflow condition in the mod_smh_config.so library caused by improper validation of user-supplied input when parsing the admin-group parameter supplied to the /proxy/SetSMHData endpoint. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to cause a denial of service condition or the execution of arbitrary code.
Note that HP SMH is reportedly affected by additional vulnerabilities; however, this plugin has not tested for them.
SolutionUpgrade to HP System Management Homepage (SMH) version 7.6 or later.