Lucene search

K
zdiAndrea Micalizzi aka rgodZDI-13-261
HistoryNov 24, 2013 - 12:00 a.m.

HP Virtual User Generator EmulationAdmin Service getReport Remote Code Execution Vulnerability

2013-11-2400:00:00
Andrea Micalizzi aka rgod
www.zerodayinitiative.com
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.0%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Virtual User Generator. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of requests to the EmulationAdmin web service. This service exposes the getReport method which does not properly sanitize parameters allowing a remote attacker to inject arbitrary SQL into the underlying database. This can be leveraged by an attacker to gain remote code execution under the context of the current database.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.0%