Lucene search

K
zdiAndrea Micalizzi aka rgodZDI-13-259
HistoryNov 24, 2013 - 12:00 a.m.

HP Virtual User Generator EmulationAdmin Service copyFileToServer Remote Code Execution Vulnerability

2013-11-2400:00:00
Andrea Micalizzi aka rgod
www.zerodayinitiative.com
10

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Virtual User Generator. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of requests to the EmulationAdmin web service. This service exposes the copyFileToServer method which contains a directory traversal flaw that allows attackers to create files at arbitrary locations with attacker controlled data. This can be leveraged by an attacker to gain remote code execution under the context of SYSTEM.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%