TippingPoint Zero Day Initiative

Hewlett-Packard Intelligent Management Center mibFileUpload Servlet Remote Code Execution Vulnerability

ZDI-13-050: March 22nd, 2013


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 12684. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Intelligent Management Center. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the mibFileUpload servlet. Authentication is not required to access this servlet, which allows a file to be written to the server. By abusing this behavior an attacker can place a file and leverage the situation to achieve remote code execution as the SYSTEM user.

Vendor Response

Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2012-11-19 - Vulnerability reported to vendor
    2013-03-22 - Coordinated public release of advisory


This vulnerability was discovered by:
    Andrea Micalizzi aka rgod