Korean
<< Back
VID 23161
Severity 30
Port 2301,2381
Protocol TCP
Class CGI
Detailed Description The HP SMH service is vulnerable to a directory traversal vulnerability in the 'namazu.cgi' script. Hewlett-Packard System Management Homepage (SMH) is a web-based management interface for ProLiant and Integrity servers. HP SIM versions 2.0.0 through 2.1.4 running on Microsoft Windows platforms are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input passed to the 'lang' parameter of the 'namazu.cgi' script. By sending a specially-crafted URL to the 'namazu.cgi' script containing "dot dot" sequences (/../) in the 'lang' parameter, a remote attacker could traverse directories on the Web server to read arbitrary files on the affected host subject to the permissions of the web server user id.

* References:
http://www.securityfocus.com/archive/1/426345/30/0/threaded
http://secunia.com/advisories/19059/
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00601530

* Platforms Affected:
HP System Management Homepage 2.0.0 through 2.1.4
Microsoft Windows Any version
Recommendation This vulnerability can be addressed by manually editing configuration files in the HP SMH installation, as listed in the Hewlett-Packard Company Security Bulletin HPSBMA02099 SSRT061118 rev.1 at http://www.securityfocus.com/advisories/10104
Related URL CVE-2006-1023 (CVE)
Related URL 16876 (SecurityFocus)
Related URL 24996 (ISS)