Files
CVEs-PoC/2016/CVE-2016-1543.md
T
2024-06-18 02:51:15 +02:00

22 lines
1017 B
Markdown

### [CVE-2016-1543](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1543)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
### POC
#### Reference
- http://packetstormsecurity.com/files/136462/BMC-Server-Automation-BSA-RSCD-Agent-Unauthorized-Password-Reset.html
- https://www.exploit-db.com/exploits/43902/
- https://www.exploit-db.com/exploits/43939/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/bao7uo/bmc_bladelogic
- https://github.com/patriknordlen/bladelogic_bmc-cve-2016-1542