CVE-2013-3623

Supermicro Onboard IPMI CGI Vulnerability Scanner

Title source: metasploit

Description

Multiple stack-based buffer overflows in cgi/close_window.cgi in the web interface in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allow remote attackers to execute arbitrary code via the (1) sess_sid or (2) ACT parameter.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/29666
metasploit SCANNER
by hdm, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/smt_ipmi_cgi_scanner.rb
metasploit WORKING POC GOOD
by hdm, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb

Scores

EPSS 0.8637
EPSS Percentile 99.4%

Details

CWE
CWE-119
Status published
Products (2)
supermicro/intelligent_platform_management_firmware 2.24
supermicro/intelligent_platform_management_firmware < 2.26
Published Dec 10, 2013
Tracked Since Feb 18, 2026