module

HP Data Protector EXEC_INTEGUTIL Remote Code Execution

Disclosed
2014-10-02
Created
2018-05-30

Description

This exploit abuses a vulnerability in the HP Data Protector. The vulnerability exists
in the Backup client service, which listens by default on TCP/5555. The EXEC_INTEGUTIL
request allows to execute arbitrary commands from a restricted directory. Since it
includes a perl executable, it's possible to use an EXEC_INTEGUTIL packet to execute
arbitrary code. On linux targets, the perl binary isn't on the restricted directory, but
an EXEC_BAR packet can be used to access the perl binary, even in the last version of HP
Data Protector for linux. This module has been tested successfully on HP Data Protector
9 over Windows 2008 R2 64 bits and CentOS 6 64 bits.

Authors

Aniway.Anyway Aniway.Anyway@gmail.com
juan vazquez juan.vazquez@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/misc/hp_data_protector_exec_integutil
msf exploit(hp_data_protector_exec_integutil) > show targets
...targets...
msf exploit(hp_data_protector_exec_integutil) > set TARGET < target-id >
msf exploit(hp_data_protector_exec_integutil) > show options
...show and set options...
msf exploit(hp_data_protector_exec_integutil) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.