Lucene search

K
zdiE6af8de8b1d4b2b6d5ba2610cbf9cd38ZDI-13-017
HistoryFeb 11, 2013 - 12:00 a.m.

Hewlett-Packard LeftHand Virtual SAN Appliance Password Hash Disclosure Remote Code Execution Vulnerability

2013-02-1100:00:00
e6af8de8b1d4b2b6d5ba2610cbf9cd38
www.zerodayinitiative.com
15

EPSS

0.935

Percentile

99.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LeftHand Virtual SAN Appliance. Authentication is not required to exploit this vulnerability. The flaw exists within the hydra component which listens by default on TCP port 13841. The hydra daemon is responsible for management remote operations such as user creation, snapshots, etc. A client communicating directly with this service can supply a request to the server that yields a response with user credentials including hashed passwords to be disclosed. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.