CVE-2013-6785
https://notcve.org/view.php?id=CVE-2013-6785
Directory traversal vulnerability in url_redirect.cgi in Supermicro IPMI before SMT_X9_315 allows authenticated attackers to read arbitrary files via the url_name parameter. La vulnerabilidad de salto de directorio en el archivo url_redirect.cgi en Supermicro IPMI versiones anteriores a SMT_X9_315, permite a atacantes autenticados leer archivos arbitrarios por medio del parámetro url_name. • https://blog.rapid7.com/2013/11/06/supermicro-ipmi-firmware-vulnerabilities https://www.tenable.com/cve/CVE-2013-6785 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2013-3620
https://notcve.org/view.php?id=CVE-2013-3620
Hardcoded WSMan credentials in Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before 3.15 (SMT_X9_315) and firmware for Supermicro X8 generation motherboards before SMT X8 312. Credenciales WSMan embebidas en Intelligent Platform Management Interface (IPMI) con firmware para tarjetas madres generación X9 Supermicro versiones anteriores a la versión 3.15 (SMT_X9_315) y firmware para tarjetas madres generación X8 Supermicro versiones anteriores a la versión SMT X8 312. • http://support.citrix.com/article/CTX216642 https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/89045 https://support.citrix.com/article/CTX216642 https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf • CWE-522: Insufficiently Protected Credentials •
CVE-2013-3619 – Supermicro Onboard IPMI Static SSL Certificate Scanner
https://notcve.org/view.php?id=CVE-2013-3619
Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon. Intelligent Platform Management Interface (IPMI) con firmware para las tarjetas madres generación X9 Supermicro versiones anteriores a SMT_X9_317 y el firmware para las tarjetas madres generación X8 Supermicro versiones anteriores a la verisón SMT X8 312, contienen claves de cifrado privadas embebidas para la (1) interfaz SSL del servidor web Lighttpd y el (2) demonio Dropbear SSH. • http://support.citrix.com/article/CTX216642 https://community.rapid7.com/community/metasploit/blog/2013/11/05/supermicro-ipmi-firmware-vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/89044 https://support.citrix.com/article/CTX216642 https://www.supermicro.com/products/nfo/files/IPMI/CVE_Update.pdf • CWE-798: Use of Hard-coded Credentials •
CVE-2019-19642
https://notcve.org/view.php?id=CVE-2019-19642
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareName. The attacker can achieve a persistent backdoor. Sobre las tarjetas madre SuperMicro X8STi-F con firmware IPMI versión 2.06 y BIOS versión 02.68, la funcionalidad Virtual Media permite una Inyección de Comandos de Sistema Operativo por parte de atacantes autenticados que pueden enviar peticiones HTTP hacia la dirección IP de IPMI. Esto requiere una POST en el archivo /rpc/setvmdrive.asp con metacaracteres de shell en ShareHost o ShareName. • https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2019-16649
https://notcve.org/view.php?id=CVE-2019-16649
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC. En los productos Supermicro H11, H12, M11, X9, X10 y X11, una combinación de problemas de cifrado y autenticación en el servicio multimedia virtual permite la captura de credenciales de BMC y datos transferidos mediante dispositivos multimedia virtuales. Los atacantes pueden usar credenciales capturadas para conectar dispositivos USB virtuales en el servidor administrado por el BMC. • https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack https://github.com/eclypsium/USBAnywhere https://www.supermicro.com/support/security_BMC_virtual_media.cfm • CWE-287: Improper Authentication CWE-326: Inadequate Encryption Strength CWE-522: Insufficiently Protected Credentials •