| VID |
23161 |
| Severity |
30 |
| Port |
2301,2381 |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The HP SMH service is vulnerable to a directory traversal vulnerability in the 'namazu.cgi' script. Hewlett-Packard System Management Homepage (SMH) is a web-based management interface for ProLiant and Integrity servers. HP SIM versions 2.0.0 through 2.1.4 running on Microsoft Windows platforms are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input passed to the 'lang' parameter of the 'namazu.cgi' script. By sending a specially-crafted URL to the 'namazu.cgi' script containing "dot dot" sequences (/../) in the 'lang' parameter, a remote attacker could traverse directories on the Web server to read arbitrary files on the affected host subject to the permissions of the web server user id.
* References: http://www.securityfocus.com/archive/1/426345/30/0/threaded http://secunia.com/advisories/19059/ http://itrc.hp.com/service/cki/docDisplay.do?docId=c00601530
* Platforms Affected: HP System Management Homepage 2.0.0 through 2.1.4 Microsoft Windows Any version |
| Recommendation |
This vulnerability can be addressed by manually editing configuration files in the HP SMH installation, as listed in the Hewlett-Packard Company Security Bulletin HPSBMA02099 SSRT061118 rev.1 at http://www.securityfocus.com/advisories/10104 |
| Related URL |
CVE-2006-1023 (CVE) |
| Related URL |
16876 (SecurityFocus) |
| Related URL |
24996 (ISS) |
|