Korean
<< Back
VID 23137
Severity 40
Port 80, ...
Protocol TCP
Class Daemon
Detailed Description The HP OpenView NNM is vulnerable to multiple remote arbitrary command execution vulnerabilities. HP OpenView Network Node Manager (NNM) discovers network devices and provides a map to illustrate what the network actually looks like. HP Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux could allow a remote attacker to execute arbitrary commands, caused by improper filtering of user-supplied input to various parameters used in the 'cdpView.ovpl', 'connectedNotes.ovpl', 'ecscmg.ovpl', and 'freeIPaddrs.ovpl' scripts before using it to run a command. By sending a specially crafted HTTP request containing shell meta characters, a remote attacker could execute arbitrary commands on the system within the context of the affected Web service.

* References:
http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMA01224
http://www.securityfocus.com/archive/1/409179
http://www.securityfocus.com/archive/1/409196
http://www.securityfocus.com/advisories/9150
http://secunia.com/advisories/16555/

* Platforms Affected:
HP OpenView Network Node Manager 6.2, 6.4, 7.01, 7.50
Any operating system Any version
Recommendation HP has released advisory HPSBMA01224 (SSRT051023 rev.0 - HP Openview Network Node Manager (OV NNM) Remote Unauthorized Access) to address this issue. HP recommends moving "cgi-bin/connectedNodes.ovpl" script into another directory. The same should be done for the cdpView.ovpl, freeIPaddrs.ovpl, ecscmg.ovpl scripts.

For details, please see the HP security advisory HPSBMA01224 at http://www.securityfocus.com/advisories/9150
Related URL CVE-2005-2773 (CVE)
Related URL 14662 (SecurityFocus)
Related URL 21999 (ISS)