Vulnerabilities > CVE-2013-4822 - Remote Code Execution vulnerability in HP products

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hp
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1606.

D2sec

nameHP Intelligent Management Center BIMS UploadServlet File Upload
urlhttp://www.d2sec.com/exploits/hp_intelligent_management_center_bims_uploadservlet_file_upload.html

Exploit-Db

descriptionHP Intelligent Management Center BIms UploadServlet Directory Traversal. CVE-2013-4822. Remote exploit for windows platform
idEDB-ID:29130
last seen2016-02-03
modified2013-10-22
published2013-10-22
reportermetasploit
sourcehttps://www.exploit-db.com/download/29130/
titleHP Intelligent Management Center BIms UploadServlet Directory Traversal

Metasploit

descriptionThis module exploits a directory traversal vulnerability on the version 5.2 of the BIMS component from the HP Intelligent Management Center. The vulnerability exists in the UploadServlet, allowing the user to download and upload arbitrary files. This module has been tested successfully on HP Intelligent Management Center with BIMS 5.2 E0401 on Windows 2003 SP2.
idMSF:EXPLOIT/WINDOWS/HTTP/HP_IMC_BIMS_UPLOAD
last seen2020-06-02
modified2017-07-24
published2013-10-19
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_imc_bims_upload.rb
titleHP Intelligent Management Center BIMS UploadServlet Directory Traversal

Nessus

NASL familyMisc.
NASL idHP_IMC_BIMS_52_E401.NASL
descriptionThe version of the HP Intelligent Management Center Branch Intelligent Management System module on the remote host is a version prior to 5.2 E0401 and is potentially affected by multiple vulnerabilities : - The
last seen2020-06-01
modified2020-06-02
plugin id71891
published2014-01-09
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/71891
titleHP Intelligent Management Center Branch Intelligent Management Module Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(71891);
  script_version("1.7");
  script_cvs_date("Date: 2018/11/15 20:50:23");

  script_cve_id("CVE-2013-4822", "CVE-2013-4823");
  script_bugtraq_id(62895, 62897);

  script_name(english:"HP Intelligent Management Center Branch Intelligent Management Module Multiple Vulnerabilities");
  script_summary(english:"Checks version");

  script_set_attribute(
    attribute:"synopsis",
    value:
"The version of the HP Branch Intelligent Management System module
on the remote host is affected by multiple vulnerabilities."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The version of the HP Intelligent Management Center Branch Intelligent
Management System module on the remote host is a version prior to 5.2
E0401 and is potentially affected by multiple vulnerabilities :

  - The 'bimsDownload' servlet is not protected by
    authentication and could be used to access any file on
    the system remotely. (CVE-2013-4823)

  - The 'UploadServlet' in the BIM module allows
    unauthenticated users to remotely upload arbitrary files
    to specific locations on the host. (CVE-2013-4822)"
  );
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-238/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-13-239/");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c03943425
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1f8f310b");
  script_set_attribute(attribute:"solution", value:"Upgrade the iMC BIMs module to version 5.2 E0401 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"d2_elliot_name", value:"HP Intelligent Management Center BIMS UploadServlet File Upload");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'HP Intelligent Management Center BIMS UploadServlet Directory Traversal');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2013/10/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/09/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/09");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:intelligent_management_center");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies('hp_imc_detect.nbin');
  script_require_ports('Services/activemq', 61616);
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

# Figure out which port to use
port = get_service(svc:'activemq', default:61616, exit_on_fail:TRUE);

version = get_kb_item_or_exit('hp/hp_imc/' + port + '/components/iMC-BIMS/version');

# Versions 5.1 E0201 and earlier are affected
if (version =~ '^([0-4]\\.|5\\.(0\\-|1\\-E0([0-9]{1,2}|[01][0-9]{2}|20[01])([^0-9]|$)))')
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 5.2-E0401' +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_LISTEN_NOT_VULN, 'HP Intelligent Management Center BIMS Component', port, version);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/123708/hp_imc_bims_upload.rb.txt
idPACKETSTORM:123708
last seen2016-12-05
published2013-10-22
reporterrgod
sourcehttps://packetstormsecurity.com/files/123708/HP-Intelligent-Management-Center-BIMS-UploadServlet-Directory-Traversal.html
titleHP Intelligent Management Center BIMS UploadServlet Directory Traversal