vendor:
Client Automation
by:
Ben Turner, juan vazquez
N/A
CVSS
N/A
Command Injection
78
CWE
Product Name: Client Automation
Affected Version From: HP Client Automation 9.0.0
Affected Version To: HP Client Automation 9.0.0
Patch Exists: NO
Related CWE: CVE-2015-1497
CPE: None
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=86427, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/multi/misc/persistent_hpca_radexec_exec, https://www.infosecmatter.com/nessus-plugin-library/?id=82632, https://www.infosecmatter.com/nessus-plugin-library/?id=124996, https://www.infosecmatter.com/nessus-plugin-library/?id=124997, https://www.infosecmatter.com/nessus-plugin-library/?id=80440, https://www.infosecmatter.com/nessus-plugin-library/?id=82153, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?_page=40, https://www.infosecmatter.com/nessus-plugin-library/?id=82239
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Windows
2015
HP Client Automation Command Injection
This module exploits a command injection vulnerability on HP Client Automation, distributed actually as Persistent Systems Client Automation. The vulnerability exists in the Notify Daemon (radexecd.exe), which doesn't authenticate execution requests by default neither. This module has been tested successfully on HP Client Automation 9.00 over Windows 2003 SP2 and CentOS 5.
Mitigation:
Accelerite releases solutions and best practices to enhance the security for RBAC and Remote Notify features