Vulnerabilities > CVE-2013-4835 - Unspecified vulnerability in HP Sitescope
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The APISiteScopeImpl SOAP service in HP SiteScope 10.1x and 11.x before 11.22 allows remote attackers to bypass authentication and execute arbitrary code via a direct request to the issueSiebelCmd method, aka ZDI-CAN-1765.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 9 |
D2sec
name | HP SiteScope issueSiebelCmd 11.20 RCE |
url | http://www.d2sec.com/exploits/hp_sitescope_issuesiebelcmd_11.20_rce.html |
Exploit-Db
description | HP SiteScope issueSiebelCmd Remote Code Execution. CVE-2013-4835. Remote exploit for unix platform |
file | exploits/unix/remote/30473.rb |
id | EDB-ID:30473 |
last seen | 2016-02-03 |
modified | 2013-12-24 |
platform | unix |
port | 8080 |
published | 2013-12-24 |
reporter | metasploit |
source | https://www.exploit-db.com/download/30473/ |
title | HP SiteScope issueSiebelCmd - Remote Code Execution |
type | remote |
Metasploit
description | This module exploits a code execution flaw in HP SiteScope. The vulnerability exists in the APISiteScopeImpl web service, specifically in the issueSiebelCmd method, which allows the user to execute arbitrary commands without authentication. This module has been tested successfully on HP SiteScope 11.20 over Windows 2003 SP2, Windows 2008 and CentOS 6.5. |
id | MSF:EXPLOIT/MULTI/HTTP/HP_SITESCOPE_ISSUESIEBELCMD |
last seen | 2020-06-07 |
modified | 2017-07-24 |
published | 2013-12-19 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4835 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/hp_sitescope_issuesiebelcmd.rb |
title | HP SiteScope issueSiebelCmd Remote Code Execution |
Nessus
NASL family | CGI abuses |
NASL id | HP_SITESCOPE_HPSBGN02904.NASL |
description | The version of HP SiteScope installed on the remote host is potentially affected by the following code execution vulnerabilities : - Unspecified errors exist related to SOAP functionality for which no further details have been provided. (CVE-2013-2367) - An error exists related to handling the SOAP command |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 69195 |
published | 2013-08-02 |
reporter | This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/69195 |
title | HP SiteScope Multiple Unspecified Remote Code Execution Vulnerabilities |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/124565/hp_sitescope_issuesiebelcmd.rb.txt |
id | PACKETSTORM:124565 |
last seen | 2016-12-05 |
published | 2013-12-23 |
reporter | rgod |
source | https://packetstormsecurity.com/files/124565/HP-SiteScope-issueSiebelCmd-Remote-Code-Execution.html |
title | HP SiteScope issueSiebelCmd Remote Code Execution |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 63478 CVE(CAN) ID: CVE-2013-4835 HP SiteScope是无代理监控软件,可维护其分布式IT基础架构的可用性和性能。 HP SiteScope 11.22之前版本在处理"issueSiebelCmd" SOAP请求的实现上存在安全漏洞,成功利用后可导致执行任意代码。 0 HP SiteScope < 11.22 厂商补丁: HP -- HP已经为此发布了一个安全公告(HPSBMU02933)以及相应补丁: HPSBMU02933:HP SiteScope, issueSiebelCmd SOAP Request, Remote Code Execution 链接:http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDispl |
id | SSV:61207 |
last seen | 2017-11-19 |
modified | 2013-12-25 |
published | 2013-12-25 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-61207 |
title | HP SiteScope 'issueSiebelCmd' SOAP请求远程代码执行漏洞 |
References
- http://www.exploit-db.com/exploits/30473
- http://www.exploit-db.com/exploits/30473
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969435
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969435
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969435
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969435
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03969435
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03969435