what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

HP ThinPro 6.x / 7.x Privilege Escalation

HP ThinPro 6.x / 7.x Privilege Escalation
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2019-16287
SHA-256 | 7f1293575b0e76de415de2ab20c4993ec2addd8fcc7cbbb76e519c22ef4b967d

HP ThinPro 6.x / 7.x Privilege Escalation

Change Mirror Download
HP ThinPro - Privilege escalation
===============================================================================

Identifiers
-------------------------------------------------
* CVE-2019-16287

CVSSv3 score
-------------------------------------------------
6.1 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

Vendor
-------------------------------------------------
HP - [https://www.hp.com](https://www.hp.com)

Product
-------------------------------------------------
Deliver secure desktop virtualization that’s as comfortable for IT as it is
for end users with the stunningly redesigned HP ThinPro. It has a bold new
user interface and workflow refinements that make it a breeze to configure,
manage, and use right out of the box.

Affected versions
-------------------------------------------------
- HP ThinPro Linux 7.1
- HP ThinPro Linux 7.0
- HP ThinPro Linux 6.2.1
- HP ThinPro Linux 6.2

Credit
-------------------------------------------------
Eldar Marcussen - xen1thLabs - Software Labs

Vulnerability summary
-------------------------------------------------
The ThinPro platform relies on the presence of a file to determine if it is
operating in Administrative or User mode. An unauthenticated attacker
can leverage functionality in privileged processes to create this file
which enables adminstrative access to the device.

Technical details
------------------------------------------------
An attacker can use features of applications that are running with
privileges by default to create the administrative flag file
`/var/run/hptc-admin` which enables the administrative options in the user
interface. The attacker can then simply start a a terminal session with
root privileges from the start menu.

Proof of concept
-------------------------------------------------
The following evidence is provided to illustrate the existence and
exploitation:

1. From the start menu select Control panel
2. Open the Hardware section
3. CLick on printers
4. In the new printers window press F1
5. Click Forward
6. Select `Not listed` and then click Forward
7. Click Forward
8. Select `Not listed` and then click Forward
9. Click forward
10. Click save
11. Replace `troubleshoot.txt` with `/var/run/hptc-admin` as the file name
12. Click save
13. Observe the red desktop border indicating adminstrative operation mode
14. From the start menu, select Tools -> X terminal
15. Observe X terminal spawning with root privileges

Solution
-------------------------------------------------
Contact vendor for a solution

Timeline
-------------------------------------------------
Date | Status
------------|-----------------------------
19-AUG-2019 | Reported to vendor
22-NOV-2019 | Patch available
24-MAR-2020 | Public disclosure


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close