Vulnerabilities

Command Injection Flaw Found in HP SiteScope

A vulnerability in HP SiteScope can be exploited by an attacker to execute arbitrary operating system commands, security firm Rapid7 has warned.

HP SiteScope is an agentless software designed for monitoring the performance and availability of distributed IT infrastructures, including servers, network services and devices, applications, and operating systems.

<p><strong><span><span>A vulnerability in HP SiteScope can be exploited by an attacker to execute arbitrary operating system commands, security firm Rapid7 has warned.</span></span></strong></p><p><span><span>HP SiteScope is an agentless software designed for monitoring the performance and availability of distributed IT infrastructures, including servers, network services and devices, applications, and operating systems.</span></span></p>

A vulnerability in HP SiteScope can be exploited by an attacker to execute arbitrary operating system commands, security firm Rapid7 has warned.

HP SiteScope is an agentless software designed for monitoring the performance and availability of distributed IT infrastructures, including servers, network services and devices, applications, and operating systems.

An advisory published on Friday by Rapid7 reveals that the SiteScope administration panel could in many cases be accessed simply by going to :8080/SiteScope/servlet/Main. While the control panel can be protected with a password, users are not required to set a password after installing the product, which means default deployments could be exposed to hacker attacks.

Once an attacker gains access to the administration panel, they can execute operating system commands via unsanitized user input fields in the SiteScope DNS Tool. The DNS Tool allows users to specify a DNS server and a host name to resolve, but since the fields are not sanitized, an attacker can append any operating system command to the information that would normally be entered. Rapid7 has demonstrated how an attacker can exploit the vulnerability to create a new user and add it to the local administrators group.

Executing commands in this manner is only possible on HP SiteScope installations running on Windows because on this operating system the product requires local system access in order to work properly.

If the admin panel is protected by a password, only an authenticated attacker could conduct such an attack. However, experts have pointed out that even so this is still an “unexpected level of operating system access.”

The vulnerability, identified by Kirk Hayes of Rapid7 and Charles Riggs of Knowledge Consulting Group on June 1, was initially reported via HP’s Zero Day Initiative (ZDI) program. After the issue was rejected by ZDI, the details of the vulnerability were reported directly to HP on July 1, according to Rapid7’s advisory.

While there doesn’t appear to be a patch for the flaw, SiteScope users can take steps to mitigate the risk. Customers are advised to limit access to SiteScope web services to trusted users with local system access on the machine running the product. Strong passwords should also be set for all SiteScope users.

Advertisement. Scroll to continue reading.

When running on Windows systems, the product requires local system access, which makes the use of account permissions for the app and individual users inefficient. That is why both HP and Rapid7 advise users to host SiteScope on Linux and configure it to run as a non-root user.

“As of today, we have no further security bulletin or advisory for this issue. When working with the researcher, our product documentation seemed to cover the concern as provided, and we explained that to the original person who reported this well,” HP told SecurityWeek. “Also, please note that Rapid 7 is citing the wrong SSRT number (SSRT102139 is the correct one).”

Rapid7 has disclosed the details of the vulnerability because more than 60 days have passed since the issue was reported to the vendor. A Metasploit module has also been published.

*Updated with statement from HP

Related: HP Fixes Vulnerabilities in ArcSight Products

Related: Updates Fix Several Vulnerabilities in HP Network Automation

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version