CVE-2013-4810
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH
10,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,8588
Percentile
1,0th
Updated
EPSS Score Trend (Last 91 Days)
94
Improper Control of Generation of Code ('Code Injection')
DraftCommon Consequences
Security Scopes Affected:
Access Control
Integrity
Confidentiality
Availability
Non-Repudiation
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Execute Unauthorized Code Or Commands
Hide Activities
Applicable Platforms
Languages:
Interpreted
Technologies:
AI/ML
Exploit
Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) …
VerifiedApache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object - Remote Code Execution
View Exploit Code →
Application
Procurve Manager by Hp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:plus:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Procurve Manager by Hp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:-:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Procurve Manager by Hp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:-:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Application Lifecycle Management by Hp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hp:application_lifecycle_management:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Procurve Manager by Hp
CPE Identifier
View Detailed Analysis
cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:plus:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013…
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?…
http://marc.info/?l=bugtraq&m=138696448823753&w=2
http://marc.info/?l=bugtraq&m=143039425503668&w=2
http://secunia.com/advisories/54788
https://www.exploit-db.com/exploits/28713/
http://www.securitytracker.com/id/1029010
http://zerodayinitiative.com/advisories/ZDI-13-229/
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?…
http://marc.info/?l=bugtraq&m=138696448823753&w=2
http://marc.info/?l=bugtraq&m=143039425503668&w=2
http://secunia.com/advisories/54788
https://www.exploit-db.com/exploits/28713/
http://www.securitytracker.com/id/1029010
http://zerodayinitiative.com/advisories/ZDI-13-229/