module
HP ProCurve Manager SNAC UpdateDomainControllerServlet File Upload
Disclosed | Created |
---|---|
09/09/2013 | 05/30/2018 |
Disclosed
09/09/2013
Created
05/30/2018
Description
This module exploits a path traversal flaw in the HP ProCurve Manager SNAC Server. The
vulnerability in the UpdateDomainControllerServlet allows an attacker to upload arbitrary
files, just having into account binary writes aren't allowed. Additionally, authentication
can be bypassed in order to upload the file. This module has been tested successfully on
the SNAC server installed with HP ProCurve Manager 4.0.
vulnerability in the UpdateDomainControllerServlet allows an attacker to upload arbitrary
files, just having into account binary writes aren't allowed. Additionally, authentication
can be bypassed in order to upload the file. This module has been tested successfully on
the SNAC server installed with HP ProCurve Manager 4.0.
Authors
rgod juan vazquez
Platform
Windows
Architectures
java
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/windows/http/hp_pcm_snac_update_domain msf /(n) > show actions ...actions... msf /(n) > set ACTION < action-name > msf /(n) > show options ...show and set options... msf /(n) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.