关联漏洞
标题:
HP Operations Agent 本地提权漏洞
(CVE-2014-2630)
描述:HP Operations Agent running Glance是美国惠普(HP)公司的一款运行了监控工具(Glance)的应用代理(用于系统管理),它支持收集管理数据、对整个异构基础设施实现事件与可用性自动监控及管理流程自动化等。 HP Operations Agent 11.00版本中存在安全漏洞。运行在Glance服务上时,本地攻击者可利用该漏洞获取权限。
描述
CVE-2014-2630 exploit for xglance-bin
介绍
# perf-exploiter (CVE-2014-2630)
In one of our recent penetration tests we have abused a vulnerability affecting a suid binary called "`xglance-bin`". Part of *HP Performance Monitoring solution*, it allowed us to escalate our local unprivileged sessions on some Linux RHEL 7.x/8.x systems to `root`. To be very honest, it was not the first time we leveraged that specific vulnerability as we abused it frequently on many HP servers with RHEL installed since 2014.
There has been indeed a CVE registered for the flaw ([CVE-2014-2630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2630)) originally discovered by Tim Brown from Portcullis. However, up to today,there is no trace in the internet of a public exploit. Hence the idea to release our code.
For more details please visit our [blog](https://www.redtimmy.com/).
文件快照
[4.0K] /data/pocs/ddc4e7c1943b2f8b620c0fa6b27018b291296306
├── [105K] perf-exploiter.sh
└── [ 835] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。