[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HP System Management Homepage JustGetSNMPQueue Command Injection

Author
metasploit
Risk
[
Security Risk High
]
0day-ID
0day-ID-20920
Category
remote exploits
Date add
22-06-2013
CVE
CVE-2013-3576
Platform
windows
This Metasploit module exploits a vulnerability found in HP System Management Homepage. By supplying a specially crafted HTTP request, it is possible to control the 'tempfilename' variable in function JustGetSNMPQueue (found in ginkgosnmp.inc), which will be used in a exec() function. This results in arbitrary code execution under the context of SYSTEM. Please note: In order for the exploit to work, the victim must enable the 'tftp' command, which is the case by default for systems such as Windows XP, 2003, etc.

#  0day.today [2024-11-15]  #