2 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in url_redirect.cgi in Supermicro IPMI before SMT_X9_315 allows authenticated attackers to read arbitrary files via the url_name parameter. La vulnerabilidad de salto de directorio en el archivo url_redirect.cgi en Supermicro IPMI versiones anteriores a SMT_X9_315, permite a atacantes autenticados leer archivos arbitrarios por medio del parámetro url_name. • https://blog.rapid7.com/2013/11/06/supermicro-ipmi-firmware-vulnerabilities https://www.tenable.com/cve/CVE-2013-6785 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 31%CPEs: 2EXPL: 1

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC. La especificación IPMI 2.0 soporta autenticación "RMCP+ Authenticated Key-Exchange Protocol (RAKP)", lo que permite a atacantes remotos obtener resúmenes de contraseñas y llevar a cabo ataques fuera de línea de adivinación de contraseña consiguiendo el HMAC de un mensaje RAKP 2 respondido desde un BMC. • https://www.exploit-db.com/exploits/38633 http://fish2.com/ipmi/remote-pw-cracking.html http://marc.info/?l=bugtraq&m=139653661621384&w=2 http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi https://nvidia.custhelp.com/app/answers/detail/a_id/5010 https://security.netapp.com/advisory/ntap-20190919-0005 https://support.hpe.com/hpsc/doc/public/display?docLoca • CWE-255: Credentials Management Errors •