PoC Launched for HPE Distant Assist Device Vulnerability Permitting Distant Code Execution

0
19
PoC Launched for HPE Distant Assist Device Vulnerability Permitting Distant Code Execution


Safety researchers have launched proof-of-concept (PoC) exploit code for essential vulnerabilities in Hewlett Packard Enterprise’s (HPE) Perception Distant Assist (IRS) software, together with an unauthenticated XML Exterior Entity (XXE) injection flaw (CVE-2024-53675) and a path traversal-based distant code execution (RCE) vulnerability (CVE-2024-53676). 

These flaws have an effect on IRS variations previous to v7.14.0.629 and expose methods to arbitrary file disclosure and full SYSTEM-level command execution.

Technical Breakdown of Exploitation Chain

XXE Vulnerability in System Registration Workflow (CVE-2024-53675)

The XXE vulnerability originates within the validateAgainstXSD technique of HPE’s ucacore library, which processes XML enter throughout machine registration with out correct Doc Kind Definition (DTD) restrictions, as per a report by Github. 

Attackers can exploit this by injecting malicious XML entities into the  parameter of SOAP requests to the /DeviceRegistration/DeviceRegistration.svc endpoint.

Under is an abridged PoC exploiting the XXE to exfiltrate the primary line of C:usersAdministratorDesktophello.txt:

 

    
          http://www.hp.com/it/sa/reg/Registration/RegisterDevice     
                                                                  &callhome;]]>                               

The attacker-hosted malicious.dtd forces the XML parser to leak file contents via an HTTP request:

 

"> 

%eval; 

%exfiltrate;

Path Traversal to RCE (CVE-2024-53676)

The RCE vulnerability resides within the processAtatchmentDataStream technique of the DataPackageReceiverWebSvcHelper class.

This operate improperly validates the attachmentName parameter throughout file uploads to the /DataPackageReceiver/DataPackageReceiverService.svc endpoint, enabling listing traversal. 

Attackers can add malicious JSP recordsdata to arbitrary directories (e.g., Tomcat internet roots) by crafting SOAP requests with ../ sequences:

xml_body = f""" 

 

     

         

             

                ../../webapps/ROOT/shell.jsp 

                {base64.b64encode(malicious_jsp).decode()} 

             

         

     

 

"""

The vulnerability stems from unvalidated concatenation of attachmentFileLocation, permitting attackers to override essential system recordsdata:

String attachmentFileLocation = attachmentFileDirectory + File.separatorChar + attachmentName; 

File file = new File(attachmentFileLocation); 

file.createNewFile(); // Writes attacker-controlled content material to arbitrary paths

Whereas the XXE exploit reliably leaks first-line file contents, researchers famous limitations in retrieving multi-line recordsdata resulting from parser constraints. 

The RCE exploit, nevertheless, faces a essential dependency: profitable exploitation requires a legitimate oosId (machine registration token) and registrationToken, which attackers should get hold of through different means (e.g., brute-forcing or leveraging the XXE to steal tokens).

In lab environments, unregistered gadgets triggered errors that halted attachment processing:

[ERROR] DataPackageReceiverWebSvcHelper: This machine (oosId: 93f6…e39) is just not discovered…aborted processing. 

Regardless of this, attackers with legitimate credentials (e.g., compromised associate accounts) may chain each vulnerabilities to:

  1. Steal oosId/registrationToken through XXE
  2. Add JSP webshells through RCE

Mitigation and Patch Standing

HPE addressed each points in IRS v7.14.0.629 via:

  1. Disabling DTD processing in XML validators
  2. Implementing enter sanitization for attachmentName parameters
  3. Including authentication checks for machine registration workflows

Organizations utilizing IRS ought to instantly improve to the patched model and audit logs for suspicious SOAP requests to /DeviceRegistration or /DataPackageReceiver endpoints.

Community defenders can even block exterior entry to those paths if HPE IRS operates in an internal-only capability.

Gather Menace Intelligence on the Newest Malware and Phishing Assaults with ANY.RUN TI Lookup -> Strive without spending a dime

LEAVE A REPLY

Please enter your comment!
Please enter your name here