HP StorageWorks 1/8 G2 Tape Autoloader - privilege escalation, DOS

简介: A vulnerability was found in Web Administration Interface of device HP StorageWorks 1/8 G2 Tape Autoloader.

A vulnerability was found in Web Administration Interface of device HP StorageWorks 1/8 G2 Tape Autoloader.
Default unprivileged user can escalate privileges to the administrator and execute DOS attack.


Digital Security Research Group [DSecRG] Advisory #DSECRG-09-011


Application: HP StorageWorks 1/8 G2 Tape Autoloader
Versions Affected: firmware v 2.30 and earlier
Vendor URL: http://hp.com/
Bug: Privilege escalation
Exploits: YES
Reported: 30.09.2008
Vendor Response: 30.09.2008
Date of Public Advisory: 11.01.2010
Solution: yes
CVE: CVE-2009-2680
CVSS 2.0: 8.5
Author: Alexandr Polyakov
Digital Security Research Group [DSecRG] (research [at] dsecrg [dot] com)



Description
***********
A vulnerability was found in Web Administration Interface of device HP StorageWorks 1/8 G2 Tape Autoloader.
A default unprivileged user can escalate privileges to the administrator.


Details
*******

An attacker can connect with standard credentials
(username: user and password: user).
After that he can see the cookies like that:

RMU_LEVEL 1
RMU_LOGIN 9999
RMU_SESSION 5


Then if he changes the RMU_LEVEL parameter to 2, he can be authorized as administrator.
After that he can do anything possible using administrative rights.


Solution
********

Install the following patches
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01868405

References
**********
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01868405
http://dsecrg.com/pages/vul/show.php?id=111

About
*****

Digital Security is one of the leading IT security companies in CEMEA, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com

目录
相关文章
|
11月前
|
安全 虚拟化 Windows
Windows Kernel Exploitation Notes(二)——HEVD Write-What-Where
环境配置及基础知识见上一篇,本篇及后续篇章不不再赘述。
|
Linux 数据安全/隐私保护
|
Linux 网络安全
Automatic logon configuration on Linux OS
<p><span style="font-family:Courier New; font-size:14px; color:#6600cc">Automatic logon configuration on Linux OS</span></p> <p><span style="font-family:Courier New; font-size:14px; color:#6600cc
1154 0
Zimbra 0day exploit / Privilegie escalation via LFI
# Exploit Title: Zimbra 0day exploit / Privilegie escalation via LFI # Date: 06 Dec 2013 # E...
1363 0
|
Linux
Linux Kernel Controller Area Network Protocol Local Privilege Escalation Vulnerability
http://www.securityfocus.com/data/vulnerabilities/exploits/42585.
772 0
|
移动开发 Unix 网络协议
Vuln: IBM AIX FTP Server 'NLST' Command Information Disclosure Vulnerability
use IO::Socket; $|=1; print "--== ~ AIX5l w/ FTP-SERVER REMOTE ROOT HASH DISCLOSURE EXPLOIT ...
765 0
|
Shell
sudo protection bypass exploit
#!/bin/sh## root shell exploit for postfix + sudo# tested on debian powerpc unstable## by Charle...
814 0