All the vulnerabilites related to Hewlett Packard Enterprise - Aruba AirWave
cve-2016-8526
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96495 | vdb-entry, x_refsource_BID | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt | x_refsource_CONFIRM | |
https://www.exploit-db.com/exploits/41482/ | exploit, x_refsource_EXPLOIT-DB |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Hewlett Packard Enterprise | Aruba AirWave |
Version: all versions up to, but not including, 8.2.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96495", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96495" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41482/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Aruba AirWave", "vendor": "Hewlett Packard Enterprise", "versions": [ { "status": "affected", "version": "all versions up to, but not including, 8.2.3.1" } ] } ], "datePublic": "2017-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker\u0027s choosing. This could include files that contain passwords, which could then lead to privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "XML External Entity Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-07T09:57:01", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "name": "96495", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96495" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41482/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2016-8526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Aruba AirWave", "version": { "version_data": [ { "version_value": "all versions up to, but not including, 8.2.3.1" } ] } } ] }, "vendor_name": "Hewlett Packard Enterprise" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker\u0027s choosing. This could include files that contain passwords, which could then lead to privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML External Entity Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "96495", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96495" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41482/" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2016-8526", "datePublished": "2018-08-06T20:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-8527
Vulnerability from cvelistv5
Published
2018-08-06 20:00
Modified
2024-08-06 02:27
Severity ?
EPSS score ?
Summary
Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96495 | vdb-entry, x_refsource_BID | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt | x_refsource_CONFIRM | |
https://www.exploit-db.com/exploits/41482/ | exploit, x_refsource_EXPLOIT-DB |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Hewlett Packard Enterprise | Aruba AirWave |
Version: all versions up to, but not including, 8.2.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96495", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96495" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41482/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Aruba AirWave", "vendor": "Hewlett Packard Enterprise", "versions": [ { "status": "affected", "version": "all versions up to, but not including, 8.2.3.1" } ] } ], "datePublic": "2017-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser." } ], "problemTypes": [ { "descriptions": [ { "description": "reflected cross site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-07T09:57:01", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "name": "96495", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96495" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41482/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-alert@hpe.com", "ID": "CVE-2016-8527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Aruba AirWave", "version": { "version_data": [ { "version_value": "all versions up to, but not including, 8.2.3.1" } ] } } ] }, "vendor_name": "Hewlett Packard Enterprise" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "reflected cross site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "96495", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96495" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-001.txt" }, { "name": "41482", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41482/" } ] } } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2016-8527", "datePublished": "2018-08-06T20:00:00", "dateReserved": "2016-10-07T00:00:00", "dateUpdated": "2024-08-06T02:27:40.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }