Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Micro Focus | Operation Bridge Manager | 2020.5 | - | |
| Micro Focus | Application Performance Management | 9.51 | - | |
| Micro Focus | Data Center Automation | 2019.11 | - | |
| Micro Focus | Operations Bridge (containerized) | 2019.11 | - | |
| Micro Focus | Universal CMDB | 2020.05 | - | |
| Micro Focus | Hybrid Cloud Management | 2018.05 ~ 2020.05 | - | |
| Micro Focus | Service Management Automation | 2020.05 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A simple workflow that runs all Micro Focus related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/micro-focus-workflow.yaml | POC Details |
| 2 | Micro Focus Universal CMDB default login credentials were discovered for diagnostics/admin. Note there is potential for this to be chained together with other vulnerabilities as with CVE-2020-11853 and CVE-2020-11854. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/default-logins/UCMDB/ucmdb-default-login.yaml | POC Details |
| 3 | Micro Focus Operations Bridge Manager in versions 2020.05 and below is vulnerable to remote code execution via UCMDB. The vulnerability allows remote attackers to execute arbitrary code on affected installations of Data Center Automation. An attack requires network access and authentication as a valid application user. Originated from Metasploit module (#14654). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-11853.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet