TippingPoint Zero Day Initiative

Hewlett-Packard Universal CMDB Integration Service UploadScansServlet Remote Code Execution Vulnerability

ZDI-14-099: April 17th, 2014


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 13482. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Universal Configuration Management Database (CMDB). Authentication is required to exploit this vulnerability, but it is trivial to bypass.

The specific flaw exists in the handling of requests to the Integration Service. The service exposes the UploadScanServlet which contains a flaw that allows attackers to create files at arbitrary locations with attacker controlled data. This vulnerability can be leveraged by an attacker to gain remote code execution under the context of SYSTEM.

Vendor Response

Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2014-01-20 - Vulnerability reported to vendor
    2014-04-17 - Coordinated public release of advisory


This vulnerability was discovered by:
    Andrea Micalizzi aka rgod