module

HP SiteScope Remote Code Execution

Disclosed
Jul 29, 2013
Created
May 30, 2018

Description

This module exploits a code execution flaw in HP SiteScope.
The vulnerability exists in the opcactivate.vbs script, which
is reachable from the APIBSMIntegrationImpl AXIS service, and
uses WScript.Shell.run() to execute cmd.exe with user provided
data. Note that the opcactivate.vbs component is installed
with the (optional) HP Operations Agent component. The module
has been tested successfully on HP SiteScope 11.20 (with HP
Operations Agent) over Windows 2003 SP2.

Authors

rgod rgod@autistici.org
juan vazquez juan.vazquez@metasploit.com

Platform

Windows

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/hp_sitescope_runomagentcommand
msf exploit(hp_sitescope_runomagentcommand) > show targets
...targets...
msf exploit(hp_sitescope_runomagentcommand) > set TARGET < target-id >
msf exploit(hp_sitescope_runomagentcommand) > show options
...show and set options...
msf exploit(hp_sitescope_runomagentcommand) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.