<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: System Management Homepage Vulnerability Question in Server Management - Systems Insight Manager</title>
    <link>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6109577#M57023</link>
    <description>&lt;P&gt;Sorry for my lack of knowledge on this forum - could you post or link to where this concern was answered?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I don't have a solution then I will have to remove this software from a number of servers for regulatory/security compliance.&amp;nbsp; I assume that this was started in repose to CERT advisory 735364: &lt;A target="_blank" href="http://www.kb.cert.org/vuls/id/735364"&gt;http://www.kb.cert.org/vuls/id/735364&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The latest version: 7.2.1.3 dated 2013-May-21 is still reported to have this vulnerability due to the php.exe file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jun 2013 22:46:27 GMT</pubDate>
    <dc:creator>Anwaar Bhatti</dc:creator>
    <dc:date>2013-06-21T22:46:27Z</dc:date>
    <item>
      <title>System Management Homepage Vulnerability Question</title>
      <link>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6068523#M56795</link>
      <description>&lt;P&gt;Greetings,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this is the correct location for this query.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HP Support has failed to reply to this question (the Security Ops guys were more helpful, but unable (correctly) to answer the question).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Perhaps someone here can clear this issue up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;Can you verify in which version - precisely - the following security vulnerability is corrected?&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;[1]&amp;nbsp;&lt;A href="http://osvdb.org/show/osvdb/91812" target="_blank"&gt;http://osvdb.org/show/osvdb/91812&lt;/A&gt;&amp;nbsp;- "HP System Management Homepage (SMH) /proxy/DataValidation iprange Parameter Remote Code Execution"&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;"HP System Management Homepage contains a flaw in its web interface. The issue is triggered by improper handling of the 'iprange' parameter in requests to /proxy/DataValidation. With a specially crafted request, a remote attacker can execute arbitrary code."&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;[2]&amp;nbsp;&lt;A href="http://packetstormsecurity.com/files/121043/HP-System-Management-Anonymous-Access-Code-Execution.html" target="_blank"&gt;http://packetstormsecurity.com/files/121043/HP-System-Management-Anonymous-Access-Code-Execution.html&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;There seems to be some confusion over when this issue was corrected - your assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This needs to be CLEARLY answered by HP regardless of what the two outlets above say. The EXACT version(s) or patches which correct this issue need to be clearly posted somewhere.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.S. This thread has been moved&amp;nbsp;from Systems Management (OpenView-OP Mgmt) Support and News Forum to ITRC HP Systems Insight Manager Forum - Hp Forum Moderator&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 May 2013 03:58:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6068523#M56795</guid>
      <dc:creator>DarrelJenkins</dc:creator>
      <dc:date>2013-05-20T03:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: System Management Homepage Vulnerability Question</title>
      <link>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6069961#M56796</link>
      <description>&lt;P&gt;:(&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A little disappointed here - not even a reply of 'wrong place, fella.'?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas here, folks?&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2013 13:32:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6069961#M56796</guid>
      <dc:creator>DarrelJenkins</dc:creator>
      <dc:date>2013-05-16T13:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: System Management Homepage Vulnerability Question</title>
      <link>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6071285#M56797</link>
      <description>&lt;P&gt;HP replied elsewhere on this. Consider solved.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2013 15:32:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6071285#M56797</guid>
      <dc:creator>DarrelJenkins</dc:creator>
      <dc:date>2013-05-17T15:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: System Management Homepage Vulnerability Question</title>
      <link>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6109577#M57023</link>
      <description>&lt;P&gt;Sorry for my lack of knowledge on this forum - could you post or link to where this concern was answered?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I don't have a solution then I will have to remove this software from a number of servers for regulatory/security compliance.&amp;nbsp; I assume that this was started in repose to CERT advisory 735364: &lt;A target="_blank" href="http://www.kb.cert.org/vuls/id/735364"&gt;http://www.kb.cert.org/vuls/id/735364&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The latest version: 7.2.1.3 dated 2013-May-21 is still reported to have this vulnerability due to the php.exe file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 22:46:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/system-management-homepage-vulnerability-question/m-p/6109577#M57023</guid>
      <dc:creator>Anwaar Bhatti</dc:creator>
      <dc:date>2013-06-21T22:46:27Z</dc:date>
    </item>
  </channel>
</rss>

