Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2004 PoC — HPE Data Protector 安全漏洞

Source
Associated Vulnerability
Title:HPE Data Protector 安全漏洞 (CVE-2016-2004)
Description:HPE Data Protector是美国惠普企业(Hewlett Packard Enterprise,HPE)公司的一套统一数据保护解决方案。该方案通过利用智能数据管理方法,保护跨所有物理和虚拟环境的数据,提供三方(应用源、备用服务器和目标设备)重复数据删除功能。 HPE Data Protector中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码。以下版本受到影响:HPE Data Protector 7.03_108之前版本,8.15之前版本,9.06之前版本。
Description
Adaptation of the adipinto exploit, to python3
Readme
# HP Data Protector Arbitrary Remote Command Execution

This script allows executing a command with an arbitrary number of arguments on the target system by using the 'perl.exe' interpreter installed with HP Data Protector within the `{install_path}/bin/` directory.

## Description

The main goal of this script is to bypass the limitation of executing only a single command without parameters, as provided by existing exploits. This exploit leverages a vulnerability in HP Data Protector to run any command on the target system.

## Target Operating Systems

- Microsoft Windows

## Tested Version

- HP Data Protector A.06.20

## Usage

```sh
python3 exploit.py <target> <port> <command>
python3 exploit.py 192.168.1.1 5555 'dir c:\'
python3 exploit.py 192.168.1.1 5555 'ipconfig /all'
python3 exploit.py 192.168.1.1 5555 'net user back-user b@ckUs3r!$ /ADD'
```
## Credits

- Alessandro Di Pinto (alessandro.dipinto@artificialstudios.org)
- Claudio Moletta (mclaudio@gmail.com)
- Adapted to Python 3 by Ian Lovering

## Notes

This script is based on the original exploit developed by Alessandro Di Pinto and Claudio Moletta. It has been adapted and updated to be functional in Python 3, ensuring compatibility with modern versions of Python.

## References

- [ZDI-11-055](http://www.zerodayinitiative.com/advisories/ZDI-11-055/)
- [CVE-2011-0923](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0923)
- [HP Document](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02781143)
File Snapshot

[4.0K] /data/pocs/a0750e011c1e062442686c17ca1bdd959d0fd7cf ├── [2.1K] CVE-2016-2004.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.