Vulnerabilites related to hp - procurve_manager
Vulnerability from fkie_nvd
Published
2013-09-16 13:01
Modified
2025-04-22 14:51
Severity ?
Summary
Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | identity_driven_manager | 4.0 | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E53CBFD-1B02-4536-A969-3088C478F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter." }, { "lang": "es", "value": "Multiples inyecciones SQL en GetEventsServlet en HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0, e Identity Driven Manager (IDM) 4.0, permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de los par\u00e1metros (1) sort o (2) dir." } ], "id": "CVE-2013-4809", "lastModified": "2025-04-22T14:51:37.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T13:01:46.190", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "url": "http://secunia.com/advisories/54788" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "hp-security-alert@hp.com", "url": "http://zerodayinitiative.com/advisories/ZDI-13-227/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-13-227/" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 13:01
Modified
2025-04-22 14:51
Severity ?
Summary
The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | identity_driven_manager | 4.0 | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E53CBFD-1B02-4536-A969-3088C478F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745." }, { "lang": "es", "value": "El servlet Agent (Aka AgentController) en HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0, y Identity Driven Manager (IDM) 4.0, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n HEAD. Aka ZDI-CAN-1745." } ], "id": "CVE-2013-4813", "lastModified": "2025-04-22T14:51:37.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T13:01:46.237", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "url": "http://secunia.com/advisories/54788" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "hp-security-alert@hp.com", "url": "http://zerodayinitiative.com/advisories/ZDI-13-228/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-13-228/" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 13:01
Modified
2025-04-22 14:51
Severity ?
Summary
UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | identity_driven_manager | 4.0 | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E53CBFD-1B02-4536-A969-3088C478F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." }, { "lang": "es", "value": "UpdateDomainControllerServlet en el servidor de registro SNAC de HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0 e Identity Driven Manager (IDM) 4.0 no valida apropiadamente el argumento adCert, lo que permite a atacantes remotos cargar archivos .jsp y consecuentemente ejecutar c\u00f3digo a discrecci\u00f3n a trav\u00e9s de vectores no especificados, tambien conocido como ZDI-CAN-1743." } ], "id": "CVE-2013-4811", "lastModified": "2025-04-22T14:51:37.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T13:01:46.220", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "url": "http://secunia.com/advisories/54788" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "hp-security-alert@hp.com", "url": "http://zerodayinitiative.com/advisories/ZDI-13-226/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-13-226/" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-04-15 10:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in HP ProCurve Manager and HP ProCurve Manager Plus 2.3 and earlier allows remote attackers to obtain sensitive information from the ProCurve Manager server via unknown attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | procurve_manager | * | |
hp | procurve_manager | * | |
hp | procurve_manager | 1.6 | |
hp | procurve_manager | 1.6 | |
hp | procurve_manager | 2.0 | |
hp | procurve_manager | 2.0 | |
hp | procurve_manager | 2.1 | |
hp | procurve_manager | 2.1 | |
hp | procurve_manager | 2.2 | |
hp | procurve_manager | 2.2 | |
hp | procurve_manager | 2.2.1 | |
hp | procurve_manager | 2.2.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:procurve_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A12F250-83A1-4B91-8EA7-9F39EA9FCB41", "versionEndIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:*:-:plus:*:*:*:*:*", "matchCriteriaId": "1E15E92C-3145-4289-87A6-787F5F1C1E6F", "versionEndIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "E7F46709-2181-4523-86F7-17E2B49073B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:1.6:-:plus:*:*:*:*:*", "matchCriteriaId": "A3B99A40-1B7E-45E2-A7F1-BDD9EC2AD418", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2DC8C60-794E-46A7-8F43-3C0E51E0B15D", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.0:-:plus:*:*:*:*:*", "matchCriteriaId": "8E1D098C-61BC-4D7C-9CB5-111CF6D47BBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD823142-2E0F-4A37-A00D-7BAC6E3D6635", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.1:-:plus:*:*:*:*:*", "matchCriteriaId": "E19A7455-2C85-47DD-A496-EF6B4E130D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB2DB3F5-222D-446B-A2C7-6D7DDF774816", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.2:-:plus:*:*:*:*:*", "matchCriteriaId": "81F1EFC6-E6EF-4B31-B2AA-E54A9F355607", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "979DCD39-3A4B-4D03-9FDD-3607AEA8CCF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:2.2.1:-:plus:*:*:*:*:*", "matchCriteriaId": "4684EC4E-85BC-4501-ABBA-74BE361DF3D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in HP ProCurve Manager and HP ProCurve Manager Plus 2.3 and earlier allows remote attackers to obtain sensitive information from the ProCurve Manager server via unknown attack vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en HP ProCurve Manager and HP ProCurve Manager Plus v2.3 y anteriores permite a atacantes remotos obtener informaci\u00f3n sensible del servidor ProCurve Manager a trav\u00e9s de vectores de ataque desconocidos." } ], "id": "CVE-2007-4514", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-04-15T10:30:00.233", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/53596" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34705" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34451" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1022022" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1016" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/53596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1022022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49781" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 13:01
Modified
2025-04-11 00:51
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | application_lifecycle_management | - | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 4.0 | |
hp | procurve_manager | 4.0 |
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "HP Multiple Products Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:application_lifecycle_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5B01474-2B07-4448-8265-6F3189697B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:-:*:*:*", "matchCriteriaId": "9A2CD0AC-7ED5-4C0C-8E2C-2A4531AC8A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:plus:*:*:*", "matchCriteriaId": "FEC5FF99-76CE-4525-B6B5-039762AC9425", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:-:*:*:*", "matchCriteriaId": "D39541A2-B3DF-4A56-84C8-00FC1CB2CEA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:plus:*:*:*", "matchCriteriaId": "374C81F8-DCA4-4C66-A300-94785F228E06", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874." }, { "lang": "es", "value": "HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0, Identity Driven Manager (IDM) 4.0 y Application Lifecycle Managemen permiten a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto marshalizado a (1) EJBInvokerServlet o (2) JMXInvokerServlet, tambi\u00e9n conocido como ZDI-CAN-1760. NOTA: esto es probablemente un duplicado de CVE-2007-1036, CVE-2010-0738 y/o CVE-2012-0874." } ], "id": "CVE-2013-4810", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2013-09-16T13:01:46.207", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=138696448823753\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/54788" }, { "source": "hp-security-alert@hp.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029010" }, { "source": "hp-security-alert@hp.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-229/" }, { "source": "hp-security-alert@hp.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/28713/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=138696448823753\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/54788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1029010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-229/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/28713/" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 13:01
Modified
2025-04-22 14:51
Severity ?
Summary
UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | identity_driven_manager | 4.0 | |
hp | procurve_manager | 3.20 | |
hp | procurve_manager | 4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E53CBFD-1B02-4536-A969-3088C478F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "07C125F5-3219-479F-8532-51043CADF585", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "079151A1-D257-43EE-B1BB-80405AEE5501", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." }, { "lang": "es", "value": "El servlet UpdateCertificatesServlet en el servicio de registro de SNAC en HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0, e Identity Driven Manager (IDM) 4.0 no valida apropiadamente el argumento \"fileName\" lo que permite a atacantes remotos subir ficheros .jsp y en consecuencia ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar , tambien conocido como ZDI-CAN-1743." } ], "id": "CVE-2013-4812", "lastModified": "2025-04-22T14:51:37.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T13:01:46.220", "references": [ { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "hp-security-alert@hp.com", "url": "http://secunia.com/advisories/54788" }, { "source": "hp-security-alert@hp.com", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "hp-security-alert@hp.com", "url": "http://zerodayinitiative.com/advisories/ZDI-13-225/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1029010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-13-225/" } ], "sourceIdentifier": "hp-security-alert@hp.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-4813 (GCVE-0-2013-4813)
Vulnerability from cvelistv5
Published
2013-09-13 18:00
Modified
2024-08-06 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745.
References
▼ | URL | Tags |
---|---|---|
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id/1029010 | vdb-entry, x_refsource_SECTRACK | |
http://zerodayinitiative.com/advisories/ZDI-13-228/ | x_refsource_MISC | |
http://secunia.com/advisories/54788 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101129", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029010" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-228/" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54788" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-25T09:00:00", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101129", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029010" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-228/" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54788" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2013-4813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBPV02918", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101129", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029010" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-13-228/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-13-228/" }, { "name": "54788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54788" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2013-4813", "datePublished": "2013-09-13T18:00:00", "dateReserved": "2013-07-12T00:00:00", "dateUpdated": "2024-08-06T16:52:27.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4812 (GCVE-0-2013-4812)
Vulnerability from cvelistv5
Published
2013-09-13 18:00
Modified
2024-08-06 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
References
▼ | URL | Tags |
---|---|---|
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id/1029010 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/54788 | third-party-advisory, x_refsource_SECUNIA | |
http://zerodayinitiative.com/advisories/ZDI-13-225/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101115", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54788" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-225/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-25T09:00:00", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101115", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54788" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-225/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2013-4812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBPV02918", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101115", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54788" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-13-225/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-13-225/" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2013-4812", "datePublished": "2013-09-13T18:00:00", "dateReserved": "2013-07-12T00:00:00", "dateUpdated": "2024-08-06T16:52:27.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4810 (GCVE-0-2013-4810)
Vulnerability from cvelistv5
Published
2013-09-13 18:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
References
▼ | URL | Tags |
---|---|---|
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
https://www.exploit-db.com/exploits/28713/ | exploit, x_refsource_EXPLOIT-DB | |
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://zerodayinitiative.com/advisories/ZDI-13-229/ | x_refsource_MISC | |
http://marc.info/?l=bugtraq&m=143039425503668&w=2 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id/1029010 | vdb-entry, x_refsource_SECTRACK | |
http://marc.info/?l=bugtraq&m=138696448823753&w=2 | vendor-advisory, x_refsource_HP | |
http://secunia.com/advisories/54788 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=143039425503668&w=2 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "28713", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/28713/" }, { "name": "SSRT101127", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-229/" }, { "name": "HPSBGN03323", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "HPSBGN02952", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=138696448823753\u0026w=2" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54788" }, { "name": "SSRT102036", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2013-4810", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:46:26.369798Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-4810" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:53.927Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-25T00:00:00+00:00", "value": "CVE-2013-4810 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-09T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-04T09:57:01.000Z", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "28713", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/28713/" }, { "name": "SSRT101127", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-229/" }, { "name": "HPSBGN03323", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "HPSBGN02952", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=138696448823753\u0026w=2" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54788" }, { "name": "SSRT102036", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2013-4810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBPV02918", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "28713", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/28713/" }, { "name": "SSRT101127", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-13-229/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-13-229/" }, { "name": "HPSBGN03323", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" }, { "name": "1029010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029010" }, { "name": "HPSBGN02952", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=138696448823753\u0026w=2" }, { "name": "54788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54788" }, { "name": "SSRT102036", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=143039425503668\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2013-4810", "datePublished": "2013-09-13T18:00:00.000Z", "dateReserved": "2013-07-12T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:53.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4811 (GCVE-0-2013-4811)
Vulnerability from cvelistv5
Published
2013-09-13 18:00
Modified
2024-08-06 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.
References
▼ | URL | Tags |
---|---|---|
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id/1029010 | vdb-entry, x_refsource_SECTRACK | |
http://zerodayinitiative.com/advisories/ZDI-13-226/ | x_refsource_MISC | |
http://secunia.com/advisories/54788 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101116", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029010" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-226/" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54788" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-25T09:00:00", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101116", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029010" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-226/" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54788" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2013-4811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBPV02918", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "SSRT101116", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029010" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-13-226/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-13-226/" }, { "name": "54788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54788" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2013-4811", "datePublished": "2013-09-13T18:00:00", "dateReserved": "2013-07-12T00:00:00", "dateUpdated": "2024-08-06T16:52:27.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4514 (GCVE-0-2007-4514)
Vulnerability from cvelistv5
Published
2009-04-15 10:00
Modified
2024-08-07 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in HP ProCurve Manager and HP ProCurve Manager Plus 2.3 and earlier allows remote attackers to obtain sensitive information from the ProCurve Manager server via unknown attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1022022 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2009/1016 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/34451 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49781 | vdb-entry, x_refsource_XF | |
http://osvdb.org/53596 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=123930135924665&w=2 | vendor-advisory, x_refsource_HP | |
http://marc.info/?l=bugtraq&m=123930135924665&w=2 | vendor-advisory, x_refsource_HP | |
http://secunia.com/advisories/34705 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:01:09.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1022022", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022022" }, { "name": "ADV-2009-1016", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1016" }, { "name": "34451", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34451" }, { "name": "hp-procurve-unspecified-info-disclosure(49781)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49781" }, { "name": "53596", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/53596" }, { "name": "SSRT071458", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "HPSBMA02420", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "34705", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34705" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in HP ProCurve Manager and HP ProCurve Manager Plus 2.3 and earlier allows remote attackers to obtain sensitive information from the ProCurve Manager server via unknown attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1022022", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022022" }, { "name": "ADV-2009-1016", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1016" }, { "name": "34451", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34451" }, { "name": "hp-procurve-unspecified-info-disclosure(49781)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49781" }, { "name": "53596", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/53596" }, { "name": "SSRT071458", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "HPSBMA02420", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "34705", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34705" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in HP ProCurve Manager and HP ProCurve Manager Plus 2.3 and earlier allows remote attackers to obtain sensitive information from the ProCurve Manager server via unknown attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1022022", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022022" }, { "name": "ADV-2009-1016", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1016" }, { "name": "34451", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34451" }, { "name": "hp-procurve-unspecified-info-disclosure(49781)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49781" }, { "name": "53596", "refsource": "OSVDB", "url": "http://osvdb.org/53596" }, { "name": "SSRT071458", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "HPSBMA02420", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123930135924665\u0026w=2" }, { "name": "34705", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34705" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4514", "datePublished": "2009-04-15T10:00:00", "dateReserved": "2007-08-23T00:00:00", "dateUpdated": "2024-08-07T15:01:09.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4809 (GCVE-0-2013-4809)
Vulnerability from cvelistv5
Published
2013-09-13 18:00
Modified
2024-08-06 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter.
References
▼ | URL | Tags |
---|---|---|
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://zerodayinitiative.com/advisories/ZDI-13-227/ | x_refsource_MISC | |
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 | vendor-advisory, x_refsource_HP | |
http://www.securitytracker.com/id/1029010 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/54788 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:52:27.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-227/" }, { "name": "SSRT101132", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54788" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-25T09:00:00", "orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "shortName": "hp" }, "references": [ { "name": "HPSBPV02918", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zerodayinitiative.com/advisories/ZDI-13-227/" }, { "name": "SSRT101132", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54788" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2013-4809", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in GetEventsServlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) sort or (2) dir parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBPV02918", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "http://zerodayinitiative.com/advisories/ZDI-13-227/", "refsource": "MISC", "url": "http://zerodayinitiative.com/advisories/ZDI-13-227/" }, { "name": "SSRT101132", "refsource": "HP", "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409" }, { "name": "1029010", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029010" }, { "name": "54788", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54788" } ] } } } }, "cveMetadata": { "assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2", "assignerShortName": "hp", "cveId": "CVE-2013-4809", "datePublished": "2013-09-13T18:00:00", "dateReserved": "2013-07-12T00:00:00", "dateUpdated": "2024-08-06T16:52:27.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }