Server Management - Systems Insight Manager
1748261 Members
3776 Online
108760 Solutions
New Discussion

System Management Homepage Vulnerability Question

 
SOLVED
Go to solution
DarrelJenkins
Occasional Visitor

System Management Homepage Vulnerability Question

Greetings, 

 

I hope this is the correct location for this query.

 

HP Support has failed to reply to this question (the Security Ops guys were more helpful, but unable (correctly) to answer the question).

 

Perhaps someone here can clear this issue up.

 

Can you verify in which version - precisely - the following security vulnerability is corrected?

 

[1] http://osvdb.org/show/osvdb/91812 - "HP System Management Homepage (SMH) /proxy/DataValidation iprange Parameter Remote Code Execution"

 

"HP System Management Homepage contains a flaw in its web interface. The issue is triggered by improper handling of the 'iprange' parameter in requests to /proxy/DataValidation. With a specially crafted request, a remote attacker can execute arbitrary code."

 

 

There seems to be some confusion over when this issue was corrected - your assistance would be greatly appreciated.

 

This needs to be CLEARLY answered by HP regardless of what the two outlets above say. The EXACT version(s) or patches which correct this issue need to be clearly posted somewhere.

 

Thanks!

 

 

P.S. This thread has been moved from Systems Management (OpenView-OP Mgmt) Support and News Forum to ITRC HP Systems Insight Manager Forum - Hp Forum Moderator

3 REPLIES 3
DarrelJenkins
Occasional Visitor
Solution

Re: System Management Homepage Vulnerability Question

:(

 

A little disappointed here - not even a reply of 'wrong place, fella.'?

 

Any ideas here, folks?

DarrelJenkins
Occasional Visitor

Re: System Management Homepage Vulnerability Question

HP replied elsewhere on this. Consider solved.

Anwaar Bhatti
Occasional Collector

Re: System Management Homepage Vulnerability Question

Sorry for my lack of knowledge on this forum - could you post or link to where this concern was answered? 

 

If I don't have a solution then I will have to remove this software from a number of servers for regulatory/security compliance.  I assume that this was started in repose to CERT advisory 735364: http://www.kb.cert.org/vuls/id/735364

 

The latest version: 7.2.1.3 dated 2013-May-21 is still reported to have this vulnerability due to the php.exe file.

 

Thanks in advance.