POC详情: a0750e011c1e062442686c17ca1bdd959d0fd7cf

来源
关联漏洞
标题: HPE Data Protector 安全漏洞 (CVE-2016-2004)
描述:HPE Data Protector是美国惠普企业(Hewlett Packard Enterprise,HPE)公司的一套统一数据保护解决方案。该方案通过利用智能数据管理方法,保护跨所有物理和虚拟环境的数据,提供三方(应用源、备用服务器和目标设备)重复数据删除功能。 HPE Data Protector中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码。以下版本受到影响:HPE Data Protector 7.03_108之前版本,8.15之前版本,9.06之前版本。
描述
Adaptation of the adipinto exploit, to python3
介绍
# HP Data Protector Arbitrary Remote Command Execution

This script allows executing a command with an arbitrary number of arguments on the target system by using the 'perl.exe' interpreter installed with HP Data Protector within the `{install_path}/bin/` directory.

## Description

The main goal of this script is to bypass the limitation of executing only a single command without parameters, as provided by existing exploits. This exploit leverages a vulnerability in HP Data Protector to run any command on the target system.

## Target Operating Systems

- Microsoft Windows

## Tested Version

- HP Data Protector A.06.20

## Usage

```sh
python3 exploit.py <target> <port> <command>
python3 exploit.py 192.168.1.1 5555 'dir c:\'
python3 exploit.py 192.168.1.1 5555 'ipconfig /all'
python3 exploit.py 192.168.1.1 5555 'net user back-user b@ckUs3r!$ /ADD'
```
## Credits

- Alessandro Di Pinto (alessandro.dipinto@artificialstudios.org)
- Claudio Moletta (mclaudio@gmail.com)
- Adapted to Python 3 by Ian Lovering

## Notes

This script is based on the original exploit developed by Alessandro Di Pinto and Claudio Moletta. It has been adapted and updated to be functional in Python 3, ensuring compatibility with modern versions of Python.

## References

- [ZDI-11-055](http://www.zerodayinitiative.com/advisories/ZDI-11-055/)
- [CVE-2011-0923](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0923)
- [HP Document](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02781143)
文件快照

[4.0K] /data/pocs/a0750e011c1e062442686c17ca1bdd959d0fd7cf ├── [2.1K] CVE-2016-2004.py └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。