A vulnerability in HP SiteScope can be exploited by an attacker to execute arbitrary operating system commands, security firm Rapid7 has warned.
HP SiteScope is an agentless software designed for monitoring the performance and availability of distributed IT infrastructures, including servers, network services and devices, applications, and operating systems.
An advisory published on Friday by Rapid7 reveals that the SiteScope administration panel could in many cases be accessed simply by going to <server>:8080/SiteScope/servlet/Main. While the control panel can be protected with a password, users are not required to set a password after installing the product, which means default deployments could be exposed to hacker attacks.
Once an attacker gains access to the administration panel, they can execute operating system commands via unsanitized user input fields in the SiteScope DNS Tool. The DNS Tool allows users to specify a DNS server and a host name to resolve, but since the fields are not sanitized, an attacker can append any operating system command to the information that would normally be entered. Rapid7 has demonstrated how an attacker can exploit the vulnerability to create a new user and add it to the local administrators group.
Executing commands in this manner is only possible on HP SiteScope installations running on Windows because on this operating system the product requires local system access in order to work properly.
If the admin panel is protected by a password, only an authenticated attacker could conduct such an attack. However, experts have pointed out that even so this is still an “unexpected level of operating system access.”
The vulnerability, identified by Kirk Hayes of Rapid7 and Charles Riggs of Knowledge Consulting Group on June 1, was initially reported via HP’s Zero Day Initiative (ZDI) program. After the issue was rejected by ZDI, the details of the vulnerability were reported directly to HP on July 1, according to Rapid7’s advisory.
While there doesn’t appear to be a patch for the flaw, SiteScope users can take steps to mitigate the risk. Customers are advised to limit access to SiteScope web services to trusted users with local system access on the machine running the product. Strong passwords should also be set for all SiteScope users.
When running on Windows systems, the product requires local system access, which makes the use of account permissions for the app and individual users inefficient. That is why both HP and Rapid7 advise users to host SiteScope on Linux and configure it to run as a non-root user.
“As of today, we have no further security bulletin or advisory for this issue. When working with the researcher, our product documentation seemed to cover the concern as provided, and we explained that to the original person who reported this well,” HP told SecurityWeek. “Also, please note that Rapid 7 is citing the wrong SSRT number (SSRT102139 is the correct one).”
Rapid7 has disclosed the details of the vulnerability because more than 60 days have passed since the issue was reported to the vendor. A Metasploit module has also been published.
*Updated with statement from HP
Related: HP Fixes Vulnerabilities in ArcSight Products
Related: Updates Fix Several Vulnerabilities in HP Network Automation

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
Latest News
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Apple Denies Helping US Government Hack Russian iPhones
