Vulnerabilities > CVE-2010-4103 - Unspecified vulnerability in HP Insight Managed System Setup Wizard 6.0/6.0.1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
hp
nessus

Summary

Unspecified vulnerability in HP Insight Managed System Setup Wizard before 6.2 allows remote attackers to read arbitrary files via unknown vectors.

Nessus

NASL familyCGI abuses
NASL idHP_SIM_PLUGINS_AUTHENTICATION_BYPASS.NASL
descriptionThe remote host contains an HP Systems Insight Manager plugin that is affected by an authentication bypass vulnerability. It is possible to access restricted pages by using a HEAD request. A remote attacker, exploiting this flaw, could gain unauthorized access to the affected application.
last seen2020-06-01
modified2020-06-02
plugin id50563
published2010-11-11
reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/50563
titleHP Systems Insight Manager Multiple Products Authentication Bypass
code
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(50563);
  script_version("1.10");
  script_cvs_date("Date: 2018/06/13 18:56:27");

  script_cve_id("CVE-2010-3986", "CVE-2010-4100", "CVE-2010-4103");
  script_bugtraq_id(44326, 44532, 44583);
  script_xref(name:"TRA", value:"TRA-2010-03");
  script_xref(name:"Secunia", value:"41926");
  script_xref(name:"Secunia", value:"42000");
  script_xref(name:"Secunia", value:"42038");

  script_name(english:"HP Systems Insight Manager Multiple Products Authentication Bypass");
  script_summary(english:"Attempts to bypass authentication using HEAD requests");

  script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web application that is affected by an
authentication bypass vulnerability.");

  script_set_attribute(attribute:"description", value:
"The remote host contains an HP Systems Insight Manager plugin that is
affected by an authentication bypass vulnerability.  It is possible to
access restricted pages by using a HEAD request.  A remote attacker,
exploiting this flaw, could gain unauthorized access to the affected
application.");
  script_set_attribute(attribute:"see_also", value:"https://www.tenable.com/security/research/tra-2010-03");
  # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02550412
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f1a6c6b");
  # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02574359
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4bb9ab2d");
  # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02573176
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?da7cfcb3");
  script_set_attribute(attribute:"solution", value:"Apply the solution from the appropriate vendor reference.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/10/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/11/11");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:virtual_connect_enterprise_manager");
  script_end_attributes();

  script_category(ACT_ATTACK);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("hp_systems_insight_control_detect.nasl", "hp_systems_insight_dynamics_detect.nasl", "hp_systems_insight_manager_detect.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("www/hp_insight_control", "www/hp_insight_dynamics", "www/hp_insight_manager");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:50000);

vuln = FALSE;
vulnerable_apps = make_list();

# First check for HP Systems Insight Manager
install = get_install_from_kb(appname:'hp_insight_manager', port:port);
if (isnull(install))
{
  # Next check for HP Insight Control
  install = get_install_from_kb(appname:'hp_insight_control', port:port);
  if (isnull(install))
  {
    # Finally, check for HP Insight Dynamics
    install = get_install_from_kb(appname:'hp_insight_dynamics', port:port);
  }
  if (isnull(install)) exit(0, "Nessus did not detect HP Systems Insight Manager, HP Insight Control, or HP Insight Dynamics on port "+port+".");
}

dir = install['dir'];

exploits = make_array(
  'HP Insight Control Performance Management', '/pmpweb/DisplayReport.jsp',
  'HP Insight Managed System Setup Wizard', '/mssw/taskresults.jsp',
  'HP Virtual Connect Enterprise Manager', '/mvcd/jsp/jobList.jsp'
);

expected_res = make_array(
  'HP Insight Control Performance Management', '23: out.println(request.getAttribute("Content").toString());',
  'HP Insight Managed System Setup Wizard', '43:     MxBean.jspInit(request, response);',
  'HP Virtual Connect Enterprise Manager', '<title>HP Virtual Connect Enterprise Manager</title>'
);

foreach app (keys(exploits))
{
  url = dir + exploits[app];
  res = http_send_recv3(method:"HEAD", item:url, version:9, port:port, exit_on_fail:TRUE);

  if (expected_res[app] >< res[2])
  {
    if (report_paranoia < 2)
    {
      res = http_send_recv3(method:"GET", item:url, port:port, exit_on_fail:TRUE);
      if (expected_res[app] >< res[2]) continue;
    }

    vuln = TRUE;
    vulnerable_apps = make_list(vulnerable_apps, app);
  }
}

if (vuln)
{
  if (report_verbosity > 0)
  {
    if (max_index(vulnerable_apps) > 1) s = 's';
    else s = '';

    report =
      '\nNessus found the following vulnerable app'+s+' :\n';
    foreach app (vulnerable_apps)
    {
      report = report + '\n  - ' + app;
    }
    report += '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else exit(0, "No vulnerable HP applications were detected on port "+port+".");