HP Intelligent Management Center 'flexFileUpload' Servlet Remote Code Execution Vulnerability

BID:58965

Info

HP Intelligent Management Center 'flexFileUpload' Servlet Remote Code Execution Vulnerability

Bugtraq ID: 58965
Class: Input Validation Error
CVE: CVE-2012-5209
Remote: Yes
Local: No
Published: Mar 07 2013 12:00AM
Updated: Mar 07 2013 12:00AM
Credit: Andrea Micalizzi aka rgod
Vulnerable: HP Intelligent Management Center Standard Edition 5.1 E0202
HP Intelligent Management Center for Automated Network Manager 5.1 E0202
HP Intelligent Management Center Enterprise Edition 5.1 E0202
Not Vulnerable: HP Intelligent Management Center User Access Manager (UAM) 5.2_E0402
HP Intelligent Management Center Standard Edition for Windows 5.2_E0401
HP Intelligent Management Center Standard Edition for Linux 5.2_E0401
HP Intelligent Management Center Enterprise Edition for Windows 5.2_E0401
HP Intelligent Management Center Enterprise Edition for Linux 5.2_E0401
HP IMC for Automated Network Manager Enterprise Edition (Windows) 5.2_E0401
HP IMC for Automated Network Manager Enterprise Edition (Linux) 5.2_E0401

Exploit / POC

HP Intelligent Management Center 'flexFileUpload' Servlet Remote Code Execution Vulnerability

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report