{"vuid":"VU#859230","idnumber":"859230","name":"HP Business Service Management 9.12 remote code execution vulnerability","keywords":["HP","HPBSM","Remote Code"],"overview":"The HP Business Service Management (HPBSM) application contains a remote code execution vulnerability. Version 9.12 has been reported to be affected but other versions may also be affected.","clean_desc":"HPBSM uses the JBOSS application server. In the default configuration, HPBSM contains open ports that may be accessed by an unauthenticated attacker. The attacker can upload a jsp-shell as a .war file and have the JBOSS application server deploy it as a service. In the default configuration, this attacker shell will run with SYSTEM privileges.","impact":"An unauthenticated attacker may be able to deploy a backdoor shell with SYSTEM privileges.","resolution":"We are currently unaware of a practical solution to this problem. Please consider the following workarounds.","workarounds":"Restrict Access\nImplement appropriate firewall rules to blo","sysaffected":"","thanks":"Thanks to David Elze \nof Daimler TSS\n for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w","8",".","h","p",".","c","o","m","/","u","s","/","e","n","/","s","o","f","t","w","a","r","e","/","s","o","f","t","w","a","r","e","-","s","o","l","u","t","i","o","n",".","h","t","m","l","?","c","o","m","p","U","R","I","=","t","c","m",":","2","4","5","-","9","3","7","0","3","5"],"cveids":["CVE-2012-2561"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2020-05-21T16:13:31.382468Z","publicdate":"2012-05-16T00:00:00Z","datefirstpublished":"2012-05-16T14:25:46Z","dateupdated":"2012-05-16T14:25:49Z","revision":17,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":"10.0","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"9.0","cvss_environmentalscore":"9.0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}