HP System Management Homepage (SMH) is a web-based interface that consolidates the management of ProLiant and Integrity servers.
A stack buffer overflow vulnerability in HP SMH allows command execution when an attacker requests
**/proxy/DataValidation** with an overly long
**iprange** parameter. A remote unauthenticated attacker could exploit this vulnerability to run arbitrary code on the vulnerable target as the SYSTEM user.
Upgrade to HP System Management Homepage version 7.2.1 or higher.
Exploit works on HP System Management Homepage 7.2.0-14 on Windows Server 2003 SP2 English (DEP OptOut).
This exploit requires the IO-Socket-SSL Perl module.