CVE-2021-25139

9.8 CRITICAL

📋 TL;DR

CVE-2021-25139 is a critical stack-based buffer overflow vulnerability in HPE Moonshot Provisioning Manager v1.20 that allows unauthenticated remote attackers to execute arbitrary code, cause denial of service, or compromise system integrity. This affects organizations using the discontinued HPE Moonshot Provisioning Manager application for configuring HPE Moonshot 1500 chassis in VMware or Hyper-V environments.

💻 Affected Systems

Products:
  • HPE Moonshot Provisioning Manager
Versions: v1.20
Operating Systems: VMware, Microsoft Hyper-V
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the khuploadfile.cgi CGI ELF component and affects all installations of v1.20. The application is discontinued and no longer supported by HPE.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to install malware, steal data, pivot to other systems, or establish persistent access.

🟠

Likely Case

Denial of service through application crashes or system instability, potentially disrupting provisioning operations.

🟢

If Mitigated

Limited impact if the service is isolated, network access is restricted, and proper monitoring is in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable by unauthenticated users, making internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any network-accessible instance can be exploited by attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted input to the vulnerable CGI endpoint. Given the high CVSS score and unauthenticated nature, exploitation is straightforward for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04084en_us

Restart Required: No

Instructions:

HPE recommends discontinuing use of HPE Moonshot Provisioning Manager entirely as no patch is available and the product is discontinued.

🔧 Temporary Workarounds

Network Isolation

all

Completely isolate the Moonshot Provisioning Manager from all network access, including internal networks.

Configure firewall rules to block all inbound and outbound traffic to the Moonshot Provisioning Manager host

Disable Vulnerable CGI

linux

Remove or disable access to the khuploadfile.cgi endpoint if possible.

mv /path/to/khuploadfile.cgi /path/to/khuploadfile.cgi.disabled
chmod 000 /path/to/khuploadfile.cgi.disabled

🧯 If You Can't Patch

  • Immediately remove the Moonshot Provisioning Manager from all networks and decommission it
  • Replace with alternative provisioning solutions that are currently supported and patched

🔍 How to Verify

Check if Vulnerable:

Check if HPE Moonshot Provisioning Manager v1.20 is installed and running. Verify the presence of khuploadfile.cgi in the web directory.

Check Version:

Check application documentation or installation directory for version information (specific command varies by installation)

Verify Fix Applied:

Verify the system is no longer accessible on the network and the application has been removed or disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to khuploadfile.cgi endpoint
  • Large or malformed upload attempts
  • Application crashes or abnormal termination

Network Indicators:

  • Traffic to Moonshot Provisioning Manager on standard ports
  • Unusual outbound connections from the provisioning manager host

SIEM Query:

source="moonshot-provisioning" AND (uri="*khuploadfile.cgi*" OR status=500 OR process="abnormal_termination")

🔗 References

📤 Share & Export