module
HP SiteScope issueSiebelCmd Remote Code Execution
Disclosed | Created |
---|---|
2013-10-30 | 2018-05-30 |
Disclosed
2013-10-30
Created
2018-05-30
Description
This module exploits a code execution flaw in HP SiteScope. The vulnerability exists in the
APISiteScopeImpl web service, specifically in the issueSiebelCmd method, which allows the
user to execute arbitrary commands without authentication. This module has been tested
successfully on HP SiteScope 11.20 over Windows 2003 SP2, Windows 2008 and CentOS 6.5.
APISiteScopeImpl web service, specifically in the issueSiebelCmd method, which allows the
user to execute arbitrary commands without authentication. This module has been tested
successfully on HP SiteScope 11.20 over Windows 2003 SP2, Windows 2008 and CentOS 6.5.
Authors
rgod rgod@autistici.org
juan vazquez juan.vazquez@metasploit.com
juan vazquez juan.vazquez@metasploit.com
Platform
Unix,Windows
Architectures
x86, cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.