Exploit the possiblities

Aerohive Networks HiveManager Remote Shell Upload

Aerohive Networks HiveManager Remote Shell Upload
Posted Sep 8, 2017
Authored by Sandro Zaccarini

Aerohive Networks HiveManager Classic Online NMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2017-14105
MD5 | c7a05d84a6ceaa5379e1b1bb8508ce38

Aerohive Networks HiveManager Remote Shell Upload

Change Mirror Download

Aerohive Networks HiveManager Classic Online NMS is a cloud-enabled
enterprise-class management system for Aerohive networking products.
HiveManager Classic Online offers simple policy creation, firmware
upgrades, and centralized monitoring of thousands of Aerohive access
points, switches, and branch routers.

Responsible disclosure with Aerohive: Aerohive has a very reactive
security staff.

Their response to our communication was pretty fast, we received the
first ack within 24hrs and an official statement in 4days.

The latest version of the software at the time of writing can be
obtained from support portal at https://support.aerohive.com/login


The vulnerability allows a local user, even restricted as a Tenant, to
upload a backup archive that contain jsp webshell, therefore to execute
code on underlying system.

The affected component is Backup Archive Handler.


The HiveManager Classic backup is a plain .tar.gz file with a very
simple structure.

Once the archive is extracted, you will see two folders:

- HiveManager
- dbxmlfile

"dbxmlfile/" contains the HM/VHM configuration, an interesting file to
work on. Anyway our interest moved to "HiveManager/" as it contains a
directory named "tomcat/webapps" which is the default Tomcat web app.

The full tree is something like:

aa tomcat
aaa webapps
aaa hm
aaa domains
aaa MyTenant
aaa maps
aaa ca.png
aaa campus.png
aaa map_floorplan.png
aaa us.png
aaa world.png

If such directory is tampered, tar gzipped and then restored using the
backup/restore functionality, an attacker can gain code execution on the

As Proof of Concept a "webshell.jsp" file has been added at maps/ level,
then we created a new .tar.gz archive and tried to restore it.

No error has been thrown and jsp file was available under the docroot at
URI /hm/domains/MyTenant/maps/

Further analysis pointed out that full path was writable so it's
possible to upload a jsp shell even outside the Tenant scope.

Code will be executed as tomcat (uid/gid 501) allowing a full compromise
of the web UI and access to other Tenant files and configurations as


We are not aware of any workaround.


Vendor is moving to a completely new release of the product called
HiveManager-NG, which has a different architecture and is not affected
by this vulnerability. We did not perform any audit on such version of
the product.


Mitre assigned the CVE-2017-14105 for this vulnerability.


20170828 Bug discovered
20170829 Vulnerability disclosed to Aerohive
20170829 First reply from Aerohive
20170901 The vendor reply with a wontfix
20170901 Request for CVE to Mitre
20170901 Got CVE-2017-14105 from cve-assign
20170902 Full disclosure



taste your favourite IT consultant


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    7 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By