Vulnerabilities > CVE-2007-3012 - Information Disclosure vulnerability in Fujitsu PRIMERGY BX300 Blade Server

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
fujitsu

Summary

The web interface in Fujitsu-Siemens Computers PRIMERGY BX300 Switch Blade allows remote attackers to obtain sensitive information by canceling the authentication dialog when accessing a sub-page, which still displays the form field contents of the sub-page, as demonstrated using (1) config/ip_management.htm and (2) config/snmp_config.htm.

Vulnerable Configurations

Part Description Count
Hardware
Fujitsu
1

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/57500/fujitsu-primergy-disclose.txt
idPACKETSTORM:57500
last seen2016-12-05
published2007-07-07
reporterredteam-pentesting.de
sourcehttps://packetstormsecurity.com/files/57500/fujitsu-primergy-disclose.txt.html
titlefujitsu-primergy-disclose.txt

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 24761 CVE(CAN) ID: CVE-2007-3012 PRIMERGY BX300是非常适用于运算密集应用程序的刀片服务器。 PRIMERGY BX300的Web界面在处理访问认证时存在漏洞,远程攻击者可能利用此漏洞获取服务器相关的敏感信息。 PRIMERGY BX300的Web接口是可以通过HTTP访问的,在访问时默认会要求HTTP Auth认证,如果在浏览器中取消了认证对话框,就会显示空白页面,页面的HTML代码会泄露一些到Web界面子页面的超级链接。如果在浏览器中直接访问了这些链接,会再次出现认证对话,但点击“取消”后仍会显示页面和表单字段中的数据。也就是攻击者可以绕过Web界面的认证,访问管理界面中的信息。 Fujitsu PRIMERGY BX300 临时解决方法: * 禁止不可信任用户访问PRIMERGY BX300的Web接口。 厂商补丁: Fujitsu ------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: <a href="http://www.fujitsu.com/global/services/computing/server/ia/bladeserver/" target="_blank">http://www.fujitsu.com/global/services/computing/server/ia/bladeserver/</a>
idSSV:1969
last seen2017-11-19
modified2007-07-05
published2007-07-05
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-1969
titleFujitsu PRIMERGY BX300刀片服务器信息泄露漏洞