// For flags

CVE-2013-4810

HP Multiple Products Remote Code Execution Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.

HP ProCurve Manager (PCM) 3.20 y 4.0, PCM+ 3.20 y 4.0, Identity Driven Manager (IDM) 4.0 y Application Lifecycle Managemen permiten a atacantes remotos ejecutar código arbitrario a través de un objeto marshalizado a (1) EJBInvokerServlet o (2) JMXInvokerServlet, también conocido como ZDI-CAN-1760. NOTA: esto es probablemente un duplicado de CVE-2007-1036, CVE-2010-0738 y/o CVE-2012-0874.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP PCM Plus and Application Lifecycle Management. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the exposed EJBInvokerServlet and JMXInvokerServlet. An unauthenticated attacker can post a marshalled object allowing them to install an arbitrary application on the target server. A remote attacker can abuse this to execute remote code under the context of the SYSTEM user in HP PCM Plus and with administrative privileges on Application Lifecycle Management.

HP ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet.

*Credits: rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-07-12 CVE Reserved
  • 2013-09-10 CVE Published
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2024-07-17 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hp
Search vendor "Hp"
Application Lifecycle Management
Search vendor "Hp" for product "Application Lifecycle Management"
--
Affected
Hp
Search vendor "Hp"
Identity Driven Manager
Search vendor "Hp" for product "Identity Driven Manager"
4.0
Search vendor "Hp" for product "Identity Driven Manager" and version "4.0"
-
Affected
Hp
Search vendor "Hp"
Procurve Manager
Search vendor "Hp" for product "Procurve Manager"
3.20
Search vendor "Hp" for product "Procurve Manager" and version "3.20"
-
Affected
Hp
Search vendor "Hp"
Procurve Manager
Search vendor "Hp" for product "Procurve Manager"
3.20
Search vendor "Hp" for product "Procurve Manager" and version "3.20"
plus
Affected
Hp
Search vendor "Hp"
Procurve Manager
Search vendor "Hp" for product "Procurve Manager"
4.0
Search vendor "Hp" for product "Procurve Manager" and version "4.0"
-
Affected
Hp
Search vendor "Hp"
Procurve Manager
Search vendor "Hp" for product "Procurve Manager"
4.0
Search vendor "Hp" for product "Procurve Manager" and version "4.0"
plus
Affected