You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Service Management Automation versions 2020.5 and 2020.02
11
11
12
12
Exploiting this vulnerability will result in remote code execution as the root user on Linux or the SYSTEM user on Windows.
13
-
Authentication is required, the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY, which should be fed to the module.
13
+
Authentication is required, the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY,
14
+
which should be fed to the module.
14
15
Any authenticated user can exploit this vulnerability, even the lowest privileged ones.
15
16
16
-
The exploit uses a modified ysoserial c3p0 payload. The only part that is modified is that c3p0 is built using version 0.9.1.2, so that the serialVersionUid of the target is the same as the exploit. This can be achieved by patching ysoserial's pom.xml.
17
+
The exploit uses a modified ysoserial c3p0 payload. The only part that is modified is that c3p0 is built using version 0.9.1.2,
18
+
so that the serialVersionUid of the target is the same as the exploit. This can be achieved by patching ysoserial's pom.xml.
17
19
18
-
This module was only tested with Operations Bridge Manager 2020.05 and 2019.11. It should work as is with earlier Operations Bridge Manager versions, but it might require small modifications (to the cookie name or vulnerable URI) for the other affected products. However it is equally likely that it works out of the box with the other products, as HPE / Micro Focus is well known for re-using (vulnerable) code.
20
+
This module was only tested with Operations Bridge Manager 2020.05 and 2019.11. It should work as is with earlier Operations Bridge Manager
21
+
versions, but it might require small modifications (to the cookie name or vulnerable URI) for the other affected products. However it is
22
+
equally likely that it works out of the box with the other products, as HPE / Micro Focus is well known for re-using (vulnerable) code.
0 commit comments