Has there been any word if Clearpass is vulnerable to the new attack and if a patch is imminent ? I'm running 6.6.4.91777, but I believe it was released before the struts2 announcement. (CVE-2017-5638)
I've confirmed that CPPM 6.6.3 is vulnerable to this expoit. Using a very simple script, as an unauthenticated user I was able to dump the /etc/passwd file on the appliance. Testing now to see what else I am able to do.
Clarifing my own words: "unauthenciated" means unauthenticated to the web server. In our scenario you still need to at least be authenticated to our guest network.
Please seehttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt for details.
© Copyright 2024 Hewlett Packard Enterprise Development LPAll Rights Reserved.