Vulnerabilities > CVE-2013-2367 - Remote Code Execution vulnerability in HP Sitescope 11.20/11.21

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hp
critical
nessus
exploit available
metasploit

Summary

Multiple unspecified vulnerabilities in HP SiteScope 11.20 and 11.21, when SOAP is used, allow remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1678.

Vulnerable Configurations

Part Description Count
Application
Hp
2

D2sec

nameHP SiteScope runOMAgentCommand 11.20 RCE
urlhttp://www.d2sec.com/exploits/hp_sitescope_runomagentcommand_11.20_rce.html

Exploit-Db

descriptionHP SiteScope Remote Code Execution. CVE-2013-2367. Remote exploit for windows platform
idEDB-ID:28188
last seen2016-02-03
modified2013-09-10
published2013-09-10
reportermetasploit
sourcehttps://www.exploit-db.com/download/28188/
titleHP SiteScope Remote Code Execution

Metasploit

descriptionThis module exploits a code execution flaw in HP SiteScope. The vulnerability exists in the opcactivate.vbs script, which is reachable from the APIBSMIntegrationImpl AXIS service, and uses WScript.Shell.run() to execute cmd.exe with user provided data. Note that the opcactivate.vbs component is installed with the (optional) HP Operations Agent component. The module has been tested successfully on HP SiteScope 11.20 (with HP Operations Agent) over Windows 2003 SP2.
idMSF:EXPLOIT/WINDOWS/HTTP/HP_SITESCOPE_RUNOMAGENTCOMMAND
last seen2020-06-11
modified2017-07-24
published2013-09-04
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2367
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_sitescope_runomagentcommand.rb
titleHP SiteScope Remote Code Execution

Nessus

  • NASL familyCGI abuses
    NASL idHP_SITESCOPE_RUNOMAGENTCOMMAND.NASL
    descriptionThe version of HP SiteScope hosted on the remote web server has a Windows command injection vulnerability. The application hosts a web service that allows the runOMAgentCommand() method to be invoked without authentication. A remote, unauthenticated attacker could exploit this to run arbitrary Windows commands.
    last seen2020-06-01
    modified2020-06-02
    plugin id69983
    published2013-09-19
    reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/69983
    titleHP SiteScope SOAP Call runOMAgentCommand SOAP Request Arbitrary Remote Code Execution
  • NASL familyCGI abuses
    NASL idHP_SITESCOPE_HPSBGN02904.NASL
    descriptionThe version of HP SiteScope installed on the remote host is potentially affected by the following code execution vulnerabilities : - Unspecified errors exist related to SOAP functionality for which no further details have been provided. (CVE-2013-2367) - An error exists related to handling the SOAP command
    last seen2020-06-01
    modified2020-06-02
    plugin id69195
    published2013-08-02
    reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/69195
    titleHP SiteScope Multiple Unspecified Remote Code Execution Vulnerabilities

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/123153/hp_sitescope_runomagentcommand.rb.txt
idPACKETSTORM:123153
last seen2016-12-05
published2013-09-09
reporterrgod
sourcehttps://packetstormsecurity.com/files/123153/HP-SiteScope-Remote-Code-Execution.html
titleHP SiteScope Remote Code Execution

Saint

bid61506
descriptionHP SiteScope APIBSMIntegrationImpl runOMAgentCommand SOAP Request Vulnerability
osvdb95824
titlehp_sitescope_soap_runomagentcommand
typeremote