HP SAN/iQ < 9.5 Root Shell Command Injection

high Nessus Plugin ID 59330

Synopsis

A management service on the remote host has a command injection vulnerability.

Description

The version of SAN/iQ running on the remote host has a command injection vulnerability. The hydra service, used for remote management and configuration, does not properly sanitize untrusted input. A remote attacker could exploit this to execute arbitrary commands as root. Authentication is required, but can be bypassed easily by using default, hard-coded credentials.

Solution

Upgrade to HP SAN/iQ 9.5 or later.

See Also

https://www.tenable.com/security/research/tra-2011-12

http://www.agarri.fr/blog/archives/2012/02/index.html

http://www.nessus.org/u?26e0508f

http://www.nessus.org/u?64450dd1

Plugin Details

Severity: High

ID: 59330

File Name: hp_saniq_hydra_cmd_injection.nasl

Version: 1.16

Type: remote

Published: 6/1/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.7

Temporal Score: 6.4

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2012-4361

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/10/2011

Vulnerability Publication Date: 11/10/2011

Exploitable With

Metasploit (HP StorageWorks P4000 Virtual SAN Appliance Command Execution)

Reference Information

CVE: CVE-2012-4361

BID: 55132