Product: HPE System Management Homepage
Versions: 18.104.22.168 and minor versions
OWASP TOP 10: A1 Injection
Impact: Allows an attacker to perform an XSS (Cross-Site Scripting) attack,
Access Vector: Adjacent Networks
Access Complexity: Low
The HP System Management Homepage (SMH) is a web-based interface that
consolidates and simplifies the management of ProLiant and Integrity servers
running Microsoft Windows or Linux, or HP 9000 and HP Integrity servers running
HP-UX 11i. By aggregating data from HP Insight Management Agents and other
tools, SMH provides a secure and intuitive interface to review in-depth
hardware configuration and status data, performance metrics, system thresholds
and software version control information.
The risk is high because this software is used in HP Windows and Linux servers.
Actually there are many banking clients affected among other critical
The attacker can trigger this vulnerability without authentication.
parameter prod sent over GET method, exactly in this line:
var prodName = '<?php echo $prodName; ?>';
code with optional embedded HTML entities that are executed and rendered in
Proof of concept
var prodName = '<?php echo htmlentities($prodName); ?>';
Special thanks to Abelardo Suira for helping me to setup the environment and
HPE for their support fixing the vulnerability.
Jacobo Avariento <spin...@protonmail.com>
Sent with ProtonMail Secure Email.