This python script allows execution of a command with an arbitrary number of arguments. The trick calls 'perl.exe' interpreter installed with HP Data Protector inside the directory {install_path}/bin/. The main goal of the script is to bypass the limitation of executing only a single command without any parameter, as provided by already existing exploits. It is possible to exploit the security issue in order to run any command inside the target system.
170a7d65a9fbfba5d4a2f9d411ee7f6a
This Metasploit module allows execution of a command with an arbitrary number of arguments on Microsoft Windows operating systems. The trick calls a perl.exe interpreter installed with HP Data Protector inside the directory {install_path}/bin/. The main goal of the script is to bypass the limitation of execute only a single command without parameters, as provided by already existing exploits. It is possible to exploit the security issue in order to run any command inside the target system.
0930bb4ab77459873c9f363e210b5225
This exploit abuses a vulnerability in the HP Data Protector service. This flaw allows an unauthenticated attacker to take advantage of the EXEC_CMD command and traverse back to /bin/sh, this allows arbitrary remote code execution under the context of root.
f0242a5c579272779b460b669850bcd2
HP Data Protector remote shell for HP-UX that leverages improper filtering of arguments to the EXEC_CMD command.
9ff5c82454b6df98b6d11d163bed91dd
HP Data Protector Client remote code execution proof of concept exploit.
e8b0b6acd8a60c3b4a88951f0f1b04bf