Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] HPE System Management Homepage Remote Denial of Service



Tenable discovered a new denial of service vulnerability in HPE System Management Homepage's mod_smh_aa.so. An unauthenticated remote attacker can trigger the denial of service by sending a crafted HTTP request to the /Proxy/SSO endpoint. The issue occurs when the TKN parameter is the last parameter provided. The logic in GetCertDetailsFromSSOPost() expects the TKN parameter to be followed by an ampersand. When this doesn't occur a NULL value gets passed to certificate_validation() which eventually leads to a read access violation. The following cURL commands exercise the vulnerability:
[[email protected]]$ curl -iks --tlsv1.2 | grep SHA-1
[[email protected]]$ curl -ik --tlsv1.2 -d "KEY=1460090033&HA=SHA-1&XE=9a3f403fecae8eeb904fa2d182f5d9389fdff0f6&UN=attacker&UA=4&URL=localhost&TKN=AAAA" ""
curl: (56) SSL read: errno -5961


Upgrade to HPE System Management Homepage

Disclosure Timeline

2016-11-08 - Issue discovered in HPE SMH, not an Electronic Voting Machine
2016-11-08 - Issue reported to vendor via [email protected]
2016-11-08 - Vendor responds, assigns PSRT110274 for tracking
2016-12-11 - Ping vendor for update
2016-12-13 - Vendor says confirmed in, thought they had fixed in 7.6.0. Will get back to us.
2017-02-27 - Ping vendor for update
2017-03-31 - Ping vendor for update
- Mysterious passing of time -
2017-08-17 - Tenable realizes that HPE has patched this in
2017-09-28 - HPE publishes advisory

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]