This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Hewlett Packard Enterprise Intelligent Management Center Smart Connect with Wireless Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UrlAccessController servlet. The issue results from the lack of proper filtering of URLs. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Hewlett Packard Enterprise Intelligent Management Center |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-18-139 is rated as high, with a score of 7.8.
To fix ZDI-18-139, ensure that you apply the latest patches or updates provided by Hewlett Packard Enterprise for the Intelligent Management Center.
ZDI-18-139 affects installations of Hewlett Packard Enterprise Intelligent Management Center Smart Connect with Wireless Manager.
ZDI-18-139 is an authentication bypass vulnerability that allows remote attackers to escalate privileges.
No, authentication is not required to exploit the ZDI-18-139 vulnerability.