The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of HP SiteScope: six vulnerabilities

Synthesis of the vulnerability

An unauthenticated attacker can use several vulnerabilities of HP SiteScope, in order to execute privileged code.
Severity of this alert: 3/4.
Number of vulnerabilities in this bulletin: 6.
Creation date: 29/08/2012.
Références of this alert: BID-55269, BID-55273, c03489683, CERTA-2012-AVI-517, CVE-2012-3259, CVE-2012-3260, CVE-2012-3261, CVE-2012-3262, CVE-2012-3263, CVE-2012-3264, HPSBMU02815, SSRT100715, SSRT100717, SSRT100718, SSRT100719, SSRT100720, VIGILANCE-VUL-11903, ZDI-12-173, ZDI-12-174, ZDI-12-175, ZDI-12-176, ZDI-12-177, ZDI-12-178, ZDI-CAN-1461, ZDI-CAN-1463, ZDI-CAN-1464, ZDI-CAN-1465, ZDI-CAN-1472.

Description of the vulnerability

Six vulnerabilities were announced in HP SiteScope.

An unauthenticated attacker can call the SOAP getSiteScopeConfiguration() function, in order to obtain the administrator password. [severity:3/4; ZDI-12-173]

An unauthenticated attacker can use the UploadFilesHandler url, in order to upload a script on the server. [severity:3/4; BID-55273, ZDI-12-174]

An unauthenticated attacker can call the SOAP create() function, in order to create a new user. [severity:3/4; ZDI-12-175]

An unauthenticated attacker can call the SOAP getFileInternal() function, in order to read the configuration, which contains passwords. [severity:3/4; ZDI-12-176]

An unauthenticated attacker can call the SOAP loadFileContent() function, in order to read configuration files, which contain passwords. [severity:3/4; ZDI-12-177]

An unauthenticated attacker can call the SOAP update() function, in order to change the administrator's password. [severity:3/4; ZDI-12-178]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability impacts software or systems such as SiteScope.

Our Vigil@nce team determined that the severity of this security announce is important.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 6 vulnerabilities.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer vulnerability note.

Solutions for this threat

HP SiteScope: version 11.13 and patch for 10.14 and 11.20.
The version 11.13 is corrected:
  http://support.openview.hp.com/downloads.jsp
A patch is available for version 11.20 (the "_disableOldAPIs=true" property also has to be set):
  Windows :
    http://support.openview.hp.com/selfsolve/document/KM00208435
    http://support.openview.hp.com/selfsolve/document/KM00208434
  Linux :
    http://support.openview.hp.com/selfsolve/document/KM00208433
  Solaris :
    http://support.openview.hp.com/selfsolve/document/KM00208432
A patch is available for version 10.14 (the "_disableOldAPIs=true" property also has to be set):
  Windows :
    http://support.openview.hp.com/selfsolve/document/FID/DOCUMENTUM_SIS_00241
  Linux :
    http://support.openview.hp.com/selfsolve/document/FID/DOCUMENTUM_SIS_00239
  Solaris :
    http://support.openview.hp.com/selfsolve/document/FID/DOCUMENTUM_SIS_00240

HP SiteScope: workaround.
A workaround is to filter the access to the web service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities workaround. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.