CVE-2013-4810
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
16/09/2013
Last modified:
11/04/2025
Description
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:hp:application_lifecycle_management:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:-:*:*:* | ||
cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:plus:*:*:* | ||
cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:-:*:*:* | ||
cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:plus:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://marc.info/?l=bugtraq&m=138696448823753&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://secunia.com/advisories/54788
- http://www.securitytracker.com/id/1029010
- http://zerodayinitiative.com/advisories/ZDI-13-229/
- https://www.exploit-db.com/exploits/28713/
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
- http://marc.info/?l=bugtraq&m=138696448823753&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://marc.info/?l=bugtraq&m=143039425503668&w=2
- http://secunia.com/advisories/54788
- http://www.securitytracker.com/id/1029010
- http://zerodayinitiative.com/advisories/ZDI-13-229/
- https://www.exploit-db.com/exploits/28713/