TippingPoint Zero Day Initiative
 

Hewlett Packard Enterprise Application Performance Management Staging Data Replicator hpbsmsdr Missing Authentication for Critical Function Remote Code Execution Vulnerability

ZDI-17-825: September 26th, 2017

CVE ID

CVSS Score

Affected Vendors

Affected Products

    Application Performance Management Staging Data Replicator

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard Enterprise Application Performance Management Staging Data Replicator.

The specific flaw exists within the hpbsmsdr web service, which listens on TCP port 29921 by default. The software does not provide any authentication for functionality that can invoke arbitrary classes. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.

Vendor Response

Hewlett Packard Enterprise has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2017-05-30 - Vulnerability reported to vendor
    2017-09-26 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    rgod