Advisory Details

March 22nd, 2013

Hewlett-Packard Intelligent Management Center mibFileUpload Servlet Remote Code Execution Vulnerability

ZDI-13-050
ZDI-CAN-1611

CVE ID CVE-2012-5201
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Hewlett-Packard
AFFECTED PRODUCTS Intelligent Management Center
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['12684']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the mibFileUpload servlet. Authentication is not required to access this servlet, which allows a file to be written to the server. By abusing this behavior an attacker can place a file and leverage the situation to achieve remote code execution as the SYSTEM user.

ADDITIONAL DETAILS Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03689276
DISCLOSURE TIMELINE
  • 2012-11-19 - Vulnerability reported to vendor
  • 2013-03-22 - Coordinated public release of advisory
CREDIT Andrea Micalizzi aka rgod
BACK TO ADVISORIES