05-15-2013 05:55 AM - last edited on 05-19-2013 08:58 PM by maikoro
I hope this is the correct location for this query.
HP Support has failed to reply to this question (the Security Ops guys were more helpful, but unable (correctly) to answer the question).
Perhaps someone here can clear this issue up.
Can you verify in which version - precisely - the following security vulnerability is corrected?
 http://osvdb.org/show/osvdb/91812 - "HP System Management Homepage (SMH) /proxy/DataValidation iprange Parameter Remote Code Execution"
"HP System Management Homepage contains a flaw in its web interface. The issue is triggered by improper handling of the 'iprange' parameter in requests to /proxy/DataValidation. With a specially crafted request, a remote attacker can execute arbitrary code."
There seems to be some confusion over when this issue was corrected - your assistance would be greatly appreciated.
This needs to be CLEARLY answered by HP regardless of what the two outlets above say. The EXACT version(s) or patches which correct this issue need to be clearly posted somewhere.
P.S. This thread has been moved from Systems Management (OpenView-OP Mgmt) Support and News Forum to ITRC HP Systems Insight Manager Forum - Hp Forum Moderator
Solved! Go to Solution.
06-21-2013 03:46 PM
Sorry for my lack of knowledge on this forum - could you post or link to where this concern was answered?
If I don't have a solution then I will have to remove this software from a number of servers for regulatory/security compliance. I assume that this was started in repose to CERT advisory 735364: http://www.kb.cert.org/vuls/id/735364
The latest version: 126.96.36.199 dated 2013-May-21 is still reported to have this vulnerability due to the php.exe file.
Thanks in advance.