Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2004 PoC — HPE Data Protector 安全漏洞

Source
Associated Vulnerability
Title:HPE Data Protector 安全漏洞 (CVE-2016-2004)
Description:HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow remote attackers to execute arbitrary code via unspecified vectors related to lack of authentication. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2623.
Description
Adaptation of the adipinto exploit, to python3
Readme
# HP Data Protector Arbitrary Remote Command Execution

This script allows executing a command with an arbitrary number of arguments on the target system by using the 'perl.exe' interpreter installed with HP Data Protector within the `{install_path}/bin/` directory.

## Description

The main goal of this script is to bypass the limitation of executing only a single command without parameters, as provided by existing exploits. This exploit leverages a vulnerability in HP Data Protector to run any command on the target system.

## Target Operating Systems

- Microsoft Windows

## Tested Version

- HP Data Protector A.06.20

## Usage

```sh
python3 exploit.py <target> <port> <command>
python3 exploit.py 192.168.1.1 5555 'dir c:\'
python3 exploit.py 192.168.1.1 5555 'ipconfig /all'
python3 exploit.py 192.168.1.1 5555 'net user back-user b@ckUs3r!$ /ADD'
```
## Credits

- Alessandro Di Pinto (alessandro.dipinto@artificialstudios.org)
- Claudio Moletta (mclaudio@gmail.com)
- Adapted to Python 3 by Ian Lovering

## Notes

This script is based on the original exploit developed by Alessandro Di Pinto and Claudio Moletta. It has been adapted and updated to be functional in Python 3, ensuring compatibility with modern versions of Python.

## References

- [ZDI-11-055](http://www.zerodayinitiative.com/advisories/ZDI-11-055/)
- [CVE-2011-0923](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0923)
- [HP Document](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02781143)
File Snapshot

[4.0K] /data/pocs/a0750e011c1e062442686c17ca1bdd959d0fd7cf ├── [2.1K] CVE-2016-2004.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →