Vulnerabilities > CVE-2017-8979 - Unspecified vulnerability in HP Integrated Lights-Out 2 Firmware 2.29

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hp
nessus

Summary

Security vulnerabilities in the HPE Integrated Lights-Out 2 (iLO 2) firmware could be exploited remotely to allow authentication bypass, code execution, and denial of service.

Vulnerable Configurations

Part Description Count
OS
Hp
1
Hardware
Hp
1

Nessus

NASL familyCGI abuses
NASL idILO_HPESBHF_03797.NASL
descriptionA remote command execution vulnerability exists in Integrated Lights-Out 2 (iLO 2) version 2.29 due to insufficient access control. An unauthenticated, remote attacker can exploit this to bypass authentication, execute arbitrary commands or cause a denial of service.
last seen2020-06-01
modified2020-06-02
plugin id122423
published2019-02-26
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/122423
titleiLO 2 2.29 Remote Code Execution Vulnerability
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(122423);
  script_version("1.3");
  script_cvs_date("Date: 2019/10/31 15:18:50");

  script_cve_id("CVE-2017-8979");

  script_name(english:"iLO 2 2.29 Remote Code Execution Vulnerability");
  script_summary(english:"Checks version of HP Integrated Lights-Out (iLO).");

  script_set_attribute(attribute:"synopsis", value:
"The remote HP Integrated Lights-Out (iLO) server's web interface is
affected by a remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"A remote command execution vulnerability exists in Integrated 
Lights-Out 2 (iLO 2) version 2.29 due to insufficient access control.
An unauthenticated, remote attacker can exploit this to bypass 
authentication, execute arbitrary commands or cause a denial of 
service.");
  # https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03797en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0d047f53");
  script_set_attribute(attribute:"solution", value:
"Upgrade firmware of HP Integrated Lights-Out 2 (iLO 2) to 2.31, or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-8979");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/17");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/12/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/26");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:integrated_lights-out_firmware");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ilo_detect.nasl");
  script_require_keys("www/ilo", "ilo/generation", "ilo/firmware");
  script_require_ports("Services/www", 80);

  exit(0);
}

include('http.inc');
include('vcf.inc');
include('vcf_extras.inc');

port = get_http_port(default:80, embedded: TRUE);
app_info = vcf::get_app_info(app:'ilo', port:port, webapp:TRUE);

constraints = [{'generation': '2', 'equal':'2.29', 'fixed_version':'2.31'}];
vcf::ilo::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);