Enhancement: cves/2020/CVE-2020-11854.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-16 11:45:00 -04:00
parent 01f2ae3737
commit 717e54aca1
1 changed files with 6 additions and 9 deletions

View File

@ -1,19 +1,14 @@
id: CVE-2020-11854 id: CVE-2020-11854
info: info:
name: Micro Focus UCMDB RCE name: Micro Focus UCMDB - Remote Code Execution
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
description: | description: |
This template supports the detection part only. Micro Focus UCMDB is susceptible to remote code execution. Impacted products include Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions, and Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.), and Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3.
UCMDB included in versions 2020.05 and below of Operations Bridge Manager are affected,
but this template can probably also be used to detect Operations Bridge Manager
(containeirized) and Application Performance Management.
Originated from Metasploit module (#14654).
reference: reference:
- http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html - http://packetstormsecurity.com/files/161182/Micro-Focus-UCMDB-Remote-Code-Execution.html
-
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
@ -35,4 +30,6 @@ requests:
- "HttpUcmdbServiceProviderFactoryImpl" - "HttpUcmdbServiceProviderFactoryImpl"
- "ServerVersion=11.6.0" - "ServerVersion=11.6.0"
part: body part: body
condition: and condition: and
# Enhanced by mp on 2022/05/16