• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 390
  • Last Modified:

HP system manager/ Server hardware

According to the web server's banner, the version of HP System Management Homepage (SMH) running on the remote host is earlier than 6.2. Such versions are reportedly affected by the following
vulnerabilities :
- Session renegotiations are not handled properly, which could be exploited to insert arbitrary plaintext in a man-in-the-middle attack. (CVE-2009-3555)
- An attacker may be able to upload files using a POST request with 'multipart/form-data' content even if the target script doesn't actually support file uploads per se. (CVE-2009-4017)
- PHP's 'proc_open' function can be abused to bypass 'safe_mode_allowed_env_vars' and
'safe_mode_protected_env_vars' directives. (CVE-2009-4018)
- PHP does not properly protect session data as relates to interrupt corruption of '$_SESSION' and the 'session.save_path' directive. (CVE-2009-4143)
- The application allows arbitrary URL redirections. (CVE-2010-1586 and CVE-2010-3283)

- An information disclosure vulnerability exists in Apache's mod_proxy_ajp, mod_reqtimeout, and mod_proxy_http relating to timeout conditions. Note that this issue only affects SMH on Windows.
(CVE-2010-2068)

please suggest something
0
Yogesh_Exchange_Expert
Asked:
Yogesh_Exchange_Expert
1 Solution
 
Handy HolderSaggar maker's bottom knockerCommented:
I suggest you ignore it unless you think your local LAN has users on it that are experienced hackers.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now