module

HP Mercury LoadRunner Agent magentproc.exe Remote Command Execution

Disclosed
2010-05-06
Created
2018-06-14

Description

This module exploits a remote command execution vulnerablity in HP LoadRunner before 9.50
and also HP Performance Center before 9.50. HP LoadRunner 12.53 and other versions are
also most likely vulneable if the (non-default) SSL option is turned off.
By sending a specially crafted packet, an attacker can execute commands remotely.
The service is vulnerable provided the Secure Channel feature is disabled (default).

Authors

Unknown
aushack patrick@osisecurity.com.au

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/misc/hp_loadrunner_magentproc_cmdexec
msf exploit(hp_loadrunner_magentproc_cmdexec) > show targets
...targets...
msf exploit(hp_loadrunner_magentproc_cmdexec) > set TARGET < target-id >
msf exploit(hp_loadrunner_magentproc_cmdexec) > show options
...show and set options...
msf exploit(hp_loadrunner_magentproc_cmdexec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.