Vulnerabilities > CVE-2014-2602 - Unspecified vulnerability in HP Oneview 1.0/1.01

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
hp
nessus

Summary

Unspecified vulnerability in HP OneView 1.0 and 1.01 allows remote authenticated users to gain privileges via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Hp
2

Nessus

NASL familyCGI abuses
NASL idHP_ONEVIEW_PRIVILEGE_ESCALATION.NASL
descriptionThe version of HP OneView installed on the remote host is 1.0 or 1.01. Such versions are potentially affected by an unspecified, remote privilege escalation vulnerability.
last seen2020-06-01
modified2020-06-02
plugin id76055
published2014-06-13
reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/76055
titleHP OneView Unspecified Remote Privilege Escalation (HPSBGN03034)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(76055);
  script_version("1.6");
  script_cvs_date("Date: 2019/11/26");

  script_cve_id("CVE-2014-2602");
  script_bugtraq_id(67197);
  script_xref(name:"HP", value:"emr_na-c04273152");

  script_name(english:"HP OneView Unspecified Remote Privilege Escalation (HPSBGN03034)");
  script_summary(english:"Checks version of HP OneView");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application installed that is affected by an
unspecified, remote privilege escalation vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of HP OneView installed on the remote host is 1.0 or 1.01.
Such versions are potentially affected by an unspecified, remote
privilege escalation vulnerability.");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c04273152
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f1eddc86");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2014/May/10");
  script_set_attribute(attribute:"solution", value:
"Upgrade to HP OneView 1.05 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-2602");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/02");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/05/02");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:oneview");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("hp_oneview_detect.nbin");
  script_require_keys("www/hp_oneview");
  script_require_ports("Services/www", 80, 443);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("webapp_func.inc");

port = get_http_port(default:443);

install = get_install_from_kb(appname:'hp_oneview', port:port, exit_on_fail:TRUE);

appname = 'HP OneView';
dir = install['dir'];
install_loc = build_url(port:port, qs:dir + "/");

version = install["ver"];
if (version == UNKNOWN_VER)  audit(AUDIT_UNKNOWN_WEB_APP_VER, appname, install_loc);

if ('build' >< version)
{
  ver = version - strstr(version, ' build');
}

if (
  ver =~ '^1\\.0(0)?$' ||
  ver =~ '^1\\.01$'
)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  URL               : ' + install_loc +
      '\n  Installed version : ' + ver +
      '\n  Fixed version     : 1.05\n';
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, install_loc, ver);