Vulnerabilities > CVE-2014-2648 - Unspecified vulnerability in HP Operations Manager 9.10/9.11

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
hp
nessus

Summary

Unspecified vulnerability in HP Operations Manager 9.10 and 9.11 on UNIX allows remote attackers to execute arbitrary code via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Hp
2
OS
Opengroup
1

Nessus

NASL familyMisc.
NASL idHP_OPERATIONS_MANAGER_HPSMBU03127.NASL
descriptionThe version of HP Operations Manager for Unix installed on the remote host is 9.10, 9.11, or 9.20 without the vendor-supplied patches. It is, therefore, affected by multiple unspecified flaws that allow an unauthenticated, remote attacker to execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id78512
published2014-10-16
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/78512
titleHP Operations Manager 9.10 / 9.11 / 9.20 Multiple RCE
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(78512);
  script_version("1.10");
  script_cvs_date("Date: 2018/11/15 20:50:23");

  script_cve_id("CVE-2014-2648", "CVE-2014-2649");
  script_bugtraq_id(70350, 70353);
  script_xref(name:"HP", value:"emr_na-c04472866");
  script_xref(name:"IAVB", value:"2014-B-0145");
  script_xref(name:"HP", value:"HPSBMU03127");
  script_xref(name:"HP", value:"SSRT101727");

  script_name(english:"HP Operations Manager 9.10 / 9.11 / 9.20 Multiple RCE");
  script_summary(english:"Checks the version and patches of HP Operations Manager.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is missing vendor-supplied security patches.");
  script_set_attribute(attribute:"description", value:
"The version of HP Operations Manager for Unix installed on the remote
host is 9.10, 9.11, or 9.20 without the vendor-supplied patches. It
is, therefore, affected by multiple unspecified flaws that allow an
unauthenticated, remote attacker to execute arbitrary code.");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c04472866
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d21c680f");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patches referenced in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/10/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/10/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/10/16");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:operations_manager");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("hp_om_linux_installed.nbin");
  script_require_keys("installed_sw/HPOM_Linux");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

install = get_single_install(app_name:"HPOM_Linux", exit_if_unknown_ver:TRUE);
srv_ver = install["version"];
patches = install["Installed Patches"];
path = install["path"];

report = NULL;
# 9.10 / 9.11 have 2 patches
if (srv_ver =~ "^9\.1[0-1]\.")
{
  patch1 = eregmatch(string:patches, pattern:"OMLPATCH_00080_[0-9]+-[0-9.].*");
  patch2 = eregmatch(string:patches, pattern:"OMLPATCH_00081_[0-9]+-[0-9.].*");
  if (empty_or_null(patch1)) report += '\n  Missing Patch     : OML_00080';
  if (empty_or_null(patch2)) report += '\n  Missing Patch     : OML_00081';
}
# 9.20 only 1 patch
else if (srv_ver =~ "^9\.20\.")
{
  patched = eregmatch(string:patches, pattern:"OMLPATCH_00082_[0-9]+-[0-9.].*");
  if (empty_or_null(patched)) report = '\n  Missing Patch     : OML_00082';
}
else audit(AUDIT_INST_PATH_NOT_VULN, "HP Operations Manager", srv_ver, path);

if (!empty_or_null(report))
{
  report = '\n  Installed version : '+srv_ver + 
           report+
           '\n';
  security_hole(port:0, extra:report);
}
else audit(AUDIT_PACKAGE_NOT_AFFECTED, "HP Operations Manager");