HP VAN SDN Controller Root Command Injection
Posted by deepcore on July 8, 2018 – 10:04 pm
This Metasploit module exploits a hardcoded service token or default credentials in HPE VAN SDN Controller versions 2.7.18.0503 and below to execute a payload as root. A root command injection was discovered in the uninstall action’s name parameter, obviating the need to use sudo for privilege escalation. If the service token option TOKEN is blank, USERNAME and PASSWORD will be used for authentication. An additional login request will be sent.
Post a reply
You must be logged in to post a comment.