SynopsisThe remote web server is vulnerable to multiple attack vectors.
DescriptionThe remote host is running HP System Management Homepage (HPSMH), a web-based interface for managing individual ProLiant and Integrity servers.
Versions of HP System Management Homepage earlier than 6.2 are potentially affected by the following vulnerabilities :
- Session renegotiations are not handled properly, which could be exploited to insert arbitrary plaintext in a man-in-the-middle attack. (CVE-2009-3555)
- An attacker may be able to upload files using a POST request with 'multipart/form-data' content even if the target script doesn't actually support file uploads per se. (CVE-2009-4017)
- PHP's 'proc_open' function can be abused to bypass 'safe_mode_allowed_env_vars' and 'safe_mode_protected_env_vars' directives. (CVE-2009-4018)
- PHP does not properly protect session data as relates to interrupt corruption of '$_SESSION' and the 'session.save_path' directive. (CVE-2009-4143)
- An information disclosure vulnerability exists in Apache's mod_proxy_ajp, mod_reqtimeout, and mod_proxy_http relating to timeout conditions. Note that this issue only affects HPSMH on Windows. (CVE-2010-2068)
- An as-yet unspecified information disclosure vulnerability may allow an authorized user to gain access to sensitive information, which in turn could be leveraged to obtain root access on Linux installs of HPSMH. (CVE-2010-3009)
- There is an as-yet unspecified XSS issue. (CVE-2010-3011)
- There is an as-yet unspecified HTTP response splitting issue. (CVE-2010-3011)
SolutionUpgrade to HP System Management Homepage 6.2.0 or later.