Lucene search

K
zdiSteven Seeley (mr_me) of Offensive SecurityZDI-17-830
HistoryOct 03, 2017 - 12:00 a.m.

Hewlett Packard Enterprise Intelligent Management Center mibFileServlet Directory Traversal Remote Code Execution Vulnerability

2017-10-0300:00:00
Steven Seeley (mr_me) of Offensive Security
www.zerodayinitiative.com
11

EPSS

0.171

Percentile

96.2%

This vulnerability allows remote attackers to rename arbitrary files on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mibFileServlet servlet, which listens on TCP ports 8080 and 8443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of SYSTEM.

EPSS

0.171

Percentile

96.2%

Related for ZDI-17-830