Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE network
low complexity
hp
critical
exploit available
metasploit
Published: 2014-07-18
Updated: 2017-01-07
Summary
Unspecified vulnerability in HP Storage Data Protector 8.x allows remote attackers to execute arbitrary code via unknown vectors. Per: https://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04373818-2%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken "HP Storage Data Protector v8.X running on Windows 2003/2008/7/8"
Vulnerable Configurations
Part | Description | Count |
Application | Hp | 8 |
Exploit-Db
description | HP Data Protector 8.10 Remote Command Execution. CVE-2014-2623. Remote exploit for windows platform |
file | exploits/windows/remote/36304.rb |
id | EDB-ID:36304 |
last seen | 2016-02-04 |
modified | 2015-03-06 |
platform | windows |
port | 5555 |
published | 2015-03-06 |
reporter | metasploit |
source | https://www.exploit-db.com/download/36304/ |
title | HP Data Protector 8.10 Remote Command Execution |
type | remote |
description | HP Data Protector 8.x - Remote Command Execution. CVE-2014-2623. Remote exploit for hp-ux platform |
file | exploits/hp-ux/remote/35961.py |
id | EDB-ID:35961 |
last seen | 2016-02-04 |
modified | 2015-01-30 |
platform | hp-ux |
port | |
published | 2015-01-30 |
reporter | Juttikhun Khamchaiyaphum |
source | https://www.exploit-db.com/download/35961/ |
title | HP Data Protector 8.x - Remote Command Execution |
type | remote |
description | HP Data Protector Manager 8.10 - Remote Command Execution. CVE-2014-2623. Remote exploit for windows platform |
file | exploits/windows/remote/34066.py |
id | EDB-ID:34066 |
last seen | 2016-02-03 |
modified | 2014-07-14 |
platform | windows |
port | |
published | 2014-07-14 |
reporter | Polunchis |
source | https://www.exploit-db.com/download/34066/ |
title | HP Data Protector Manager 8.10 - Remote Command Execution |
type | remote |
Metasploit
description | This module exploits a remote command execution on HP Data Protector 8.10. Arbitrary commands can be executed by sending crafted requests with opcode 28 to the OmniInet service listening on the TCP/5555 port. Since there is a strict length limitation on the command, rundll32.exe is executed, and the payload is provided through a DLL by a fake SMB server. This module has been tested successfully on HP Data Protector 8.1 on Windows 7 SP1. |
id | MSF:EXPLOIT/WINDOWS/MISC/HP_DATAPROTECTOR_CMD_EXEC |
last seen | 2020-06-05 |
modified | 2017-09-14 |
published | 2015-03-04 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/misc/hp_dataprotector_cmd_exec.rb |
title | HP Data Protector 8.10 Remote Command Execution |
Saint
bid | 68672 |
description | HP Data Protector Unauthenticated Remote Code Execution |
id | net_openview_hpdataprot |
osvdb | 109069 |
title | hp_data_protector_tesertest |
type | remote |
bid | 68672 |
description | HP Data Protector Windows Unauthenticated Remote Code Execution |
id | net_openview_hpdataprot |
osvdb | 109069 |
title | hp_data_protector_perl |
type | remote |
Seebug
bulletinFamily | exploit |
description | No description provided by source. |
id | SSV:89446 |
last seen | 2017-11-19 |
modified | 2015-09-17 |
published | 2015-09-17 |
source | https://www.seebug.org/vuldb/ssvid-89446 |
title | HP Data Protector 8.x - Remote Command Execution |