CVE-2019-19642

On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareName. The attacker can achieve a persistent backdoor.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:supermicro:x8sti-f_bios:02.68:*:*:*:*:*:*:*
cpe:2.3:o:supermicro:x8sti-f_firmware:2.06:*:*:*:*:*:*:*
cpe:2.3:h:supermicro:x8sti-f:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html - Exploit, Third Party Advisory () https://www.dark-sec.net/2019/12/supermicro-ipmi-exploitation.html - Exploit, Third Party Advisory

Information

Published : 2019-12-08 04:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19642

Mitre link : CVE-2019-19642

CVE.ORG link : CVE-2019-19642


JSON object : View

Products Affected

supermicro

  • x8sti-f_firmware
  • x8sti-f
  • x8sti-f_bios
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')