CVE-2013-4810
HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, Identity Driven Manager (IDM) 4.0, and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet, aka ZDI-CAN-1760. NOTE: this is probably a duplicate of CVE-2007-1036, CVE-2010-0738, and/or CVE-2012-0874.
Published
2013-09-16T13:01:46.207
Last Modified
2025-10-22T01:15:52.090
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
-
Type: Primary
CWE-94
-
Type: Secondary
CWE-94
Affected Vendors & Products
References
-
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
Broken Link, Vendor Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=138696448823753&w=2
Mailing List
([email protected])
-
http://marc.info/?l=bugtraq&m=143039425503668&w=2
Mailing List
([email protected])
-
http://secunia.com/advisories/54788
Broken Link, Vendor Advisory
([email protected])
-
http://www.securitytracker.com/id/1029010
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
http://zerodayinitiative.com/advisories/ZDI-13-229/
Third Party Advisory, VDB Entry
([email protected])
-
https://www.exploit-db.com/exploits/28713/
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409
Broken Link, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=138696448823753&w=2
Mailing List
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=143039425503668&w=2
Mailing List
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/54788
Broken Link, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1029010
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://zerodayinitiative.com/advisories/ZDI-13-229/
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/28713/
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-4810
(134c704f-9b21-4f2e-91b3-4a467353bcc0)