First published: Mon Nov 04 2013(Updated: )
The APISiteScopeImpl SOAP service in HP SiteScope 10.1x and 11.x before 11.22 allows remote attackers to bypass authentication and execute arbitrary code via a direct request to the issueSiebelCmd method, aka ZDI-CAN-1765.
Credit: hp-security-alert@hp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP SiteScope | =10.11 | |
HP SiteScope | =10.13 | |
HP SiteScope | =11.01 | |
HP SiteScope | =11.1 | |
HP SiteScope | =11.10 | |
HP SiteScope | =11.11 | |
HP SiteScope | =11.12 | |
HP SiteScope | =11.20 | |
HP SiteScope | =11.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4835 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2013-4835, upgrade to HP SiteScope version 11.22 or later, which contains the necessary security patch.
CVE-2013-4835 exploits the APISiteScopeImpl SOAP service allowing remote attackers to bypass authentication.
CVE-2013-4835 affects HP SiteScope versions 10.11, 10.13, 11.01, 11.1, 11.10, 11.11, 11.12, 11.20, and 11.21.
Yes, CVE-2013-4835 can be exploited remotely, allowing attackers to execute arbitrary code.