Rapid7 Vulnerability & Exploit Database

HPE Systems Insight Manager AMF Deserialization RCE

Back to Search

HPE Systems Insight Manager AMF Deserialization RCE

Disclosed
12/15/2020
Created
03/09/2021

Description

A remotely exploitable vulnerability exists within HPE System Insight Manager (SIM) version 7.6.x that can be leveraged by a remote unauthenticated attacker to execute code within the context of HPE System Insight Manager's hpsimsvc.exe process, which runs with administrative privileges. The vulnerability occurs due to a failure to validate data during the deserialization process when a user submits a POST request to the /simsearch/messagebroker/amfsecure page. This module exploits this vulnerability by leveraging an outdated copy of Commons Collection, namely 3.2.2, that ships with HPE SIM, to gain RCE as the administrative user running HPE SIM.

Author(s)

  • Harrison Neal
  • Jang
  • Grant Willcox

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/http/hpe_sim_76_amf_deserialization
msf exploit(hpe_sim_76_amf_deserialization) > show targets
    ...targets...
msf exploit(hpe_sim_76_amf_deserialization) > set TARGET < target-id >
msf exploit(hpe_sim_76_amf_deserialization) > show options
    ...show and set options...
msf exploit(hpe_sim_76_amf_deserialization) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;