Vulnerabilities > CVE-2015-2109 - Authentication Bypass vulnerability in HP Operations Orchestration 10.0

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hp
nessus

Summary

Unspecified vulnerability in HP Operations Orchestration 10.x allows remote attackers to bypass authentication, and obtain sensitive information or modify data, via unknown vectors.

Vulnerable Configurations

Part Description Count
Application
Hp
1

Nessus

NASL familyCGI abuses
NASL idHP_OPERATIONS_ORCHESTRATION_HPSBMU03292.NASL
descriptionThe remote host has a version of HP Operations Orchestration installed that is 10.x prior to 10.21. It is, therefore, affected by an authentication bypass vulnerability due to an unspecified flaw. A remote attacker can exploit this flaw to bypass authentication credentials to obtain sensitive information or modify data.
last seen2020-06-01
modified2020-06-02
plugin id83278
published2015-05-07
reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/83278
titleHP Operations Orchestration 10.x Authentication Bypass
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(83278);
  script_version("1.11");
  script_cvs_date("Date: 2019/11/22");

  script_cve_id("CVE-2015-2109");
  script_bugtraq_id(73323);
  script_xref(name:"HP", value:"HPSBMU03292");
  script_xref(name:"HP", value:"SSRT101981");
  script_xref(name:"HP", value:"emr_na-c04595607");

  script_name(english:"HP Operations Orchestration 10.x Authentication Bypass");
  script_summary(english:"Checks the HP Operations Orchestration version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by an authentication bypass vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host has a version of HP Operations Orchestration installed
that is 10.x prior to 10.21. It is, therefore, affected by an
authentication bypass vulnerability due to an unspecified flaw. A
remote attacker can exploit this flaw to bypass authentication
credentials to obtain sensitive information or modify data.");
  # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c04595607
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9c2b3963");
  script_set_attribute(attribute:"solution", value:
"Upgrade to HP Operations Orchestration 10.21 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/03/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/03/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:hp:operations_orchestration");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("hp_operations_orchestration_detect.nbin");
  script_require_keys("installed_sw/HP Operations Orchestration");
  script_require_ports("Services/www", 8080, 8443);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

port = get_http_port(default:8080);
appname = "HP Operations Orchestration";

get_install_count(app_name:appname, exit_if_zero:TRUE);

install = get_single_install(app_name:appname, port:port);

dir = install['path'];
version = install['version'];

install_url = build_url(port:port, qs:dir);

if (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_WEB_APP_VER, appname, install_url);

if (version =~ '^10\\.' && ver_compare(ver:version, fix:"10.21", strict:FALSE) < 0)
{
  if (report_verbosity > 0)
  {
    report =
      '\n  URL               : ' + install_url +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 10.21\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port:port);
  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, install_url, version);