Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-2630 PoC — HP Operations Agent 本地提权漏洞

Source
Associated Vulnerability
Title:HP Operations Agent 本地提权漏洞 (CVE-2014-2630)
Description:HP Operations Agent running Glance是美国惠普(HP)公司的一款运行了监控工具(Glance)的应用代理(用于系统管理),它支持收集管理数据、对整个异构基础设施实现事件与可用性自动监控及管理流程自动化等。 HP Operations Agent 11.00版本中存在安全漏洞。运行在Glance服务上时,本地攻击者可利用该漏洞获取权限。
Description
CVE-2014-2630 exploit for xglance-bin 
Readme
# perf-exploiter (CVE-2014-2630) 

In one of our recent penetration tests we have abused a vulnerability affecting a suid binary called "`xglance-bin`". Part of *HP Performance Monitoring solution*, it allowed us to escalate our local unprivileged sessions on some Linux RHEL 7.x/8.x systems to `root`. To be very honest, it was not the first time we leveraged that specific vulnerability as we abused it frequently on many HP servers with RHEL installed since 2014.

There has been indeed a CVE registered for the flaw ([CVE-2014-2630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2630)) originally discovered by Tim Brown from Portcullis. However, up to today,there is no trace in the internet of a public exploit. Hence the idea to release our code. 

For more details please visit our [blog](https://www.redtimmy.com/).
File Snapshot

[4.0K] /data/pocs/ddc4e7c1943b2f8b620c0fa6b27018b291296306 ├── [105K] perf-exploiter.sh └── [ 835] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.