HP Network Node Manager Command Injection Vulnerability
3 Feb. 2011
Summary
Remote exploitation of a command injection vulnerability in Hewlett-Packard Development Co. LP (HP)'s Network Node Manager could allow an attacker to execute arbitrary commands with the privileges of the affected service.
Vulnerable Systems:
OpenView Network Node Manager version 7.51
OpenView Network Node Manager version 7.53
OpenView Network Node Manager version 7.51
The vulnerability exists within CGI scripts provided with the NNM HTTP Server. These scripts do not effectively sanatize a particular parameter. It is possible for an attacker to supply a parameter containing a specially crafted command line string. The command line string will be executed on the affected NNM HTTP Server.
Exploitation of this vulnerability results in the execution of arbitrary commands with the privileges of the affected service. On RedHat Enterprise 4, the application is started as the user 'bin.' By default no authentication is required.
Workaround:
By default the affected CGI scripts do not require a user to be authenticated. Authentication can be enabled on the NNM HTTP Server. For further details refer to the NNM "Managing your network" guide.