Advisory Details

September 7th, 2017

Hewlett Packard Enterprise Application Performance Management System Health Authentication Bypass Vulnerability

ZDI-17-722
ZDI-CAN-4466

CVE ID CVE-2017-13983
CVSS SCORE 6.8, (AV:N/AC:L/Au:S/C:C/I:N/A:N)
AFFECTED VENDORS Hewlett Packard Enterprise
AFFECTED PRODUCTS Application Performance Management System Health
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 27705. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Hewlett Packard Enterprise Application Performance Management System Health. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the configuration of the System Health service, which listens on TCP port 18080 by default. By submitting a crafted request, an attacker can bypass authentication to access the web application. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS Hewlett Packard Enterprise has issued an update to correct this vulnerability. More details can be found at:
https://softwaresupport.hpe.com/km/KM02942065
DISCLOSURE TIMELINE
  • 2017-02-01 - Vulnerability reported to vendor
  • 2017-09-07 - Coordinated public release of advisory
CREDIT rgod
BACK TO ADVISORIES