HP Release Control XXE Injection

2014.08.01
Credit: MustLive
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Hello! I'll give you additional information concerning advisory HP Release Control Authenticated XXE Exploit (http://1337day.com/exploit/description/22267). Three different vulnerabilities were used in this exploit for successful attack. For my attack it's needed to use only one vulnerability (exactly the XXE) to conduct attacks on other web sites from target host. ------------------------- Affected products: ------------------------- HP Release Control 9.20.0000 Build 395 and previous versions. ------------------------- Affected vendors: ------------------------- Hewlett-Packard. ---------- Details: ---------- HP Release Control is vulnerable to XXE Injection. Besides standard vectors of attacks with XXE Injection vulnerabilities (such as local file inclusion), which are usually mentioned in advisories, XXE Injection also allows to conduct attacks on other sites. And with using DAVOSET (DDoS attacks via other sites execution tool) it's possible to automate such attacks. I wrote about such attacks in my 2012's article "Using XML External Entities (XXE) for attacks on other sites" (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2012-August/008481.html) and 2013's "Using XXE vulnerabilities for attacks on other sites" (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-August/008887.html). As I described in my articles, XXE vulnerabilities can be used for conducting CSRF and DoS attacks on other sites (and at using multiple web sites it's possible to conduct DDoS attacks). And my tool DAVOSET can be used for conducting such attacks via XXE vulnerabilities. Video demonstration of DAVOSET: http://www.youtube.com/watch?v=RKi35-f346I So all vulnerable versions of HP Release Control can be used for attacks on other sites via XXE Injection. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua

References:

http://websecurity.com.ua
http://www.youtube.com/watch?v=RKi35-f346I


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top