# Exploit Title: HP WebInspect - XML External Entity # Date: 23\04\2015 # Exploit Author: Jakub Palaczynski # Vendor Homepage: http://www.hp.com/ # Version: 10.4, 10.3, 10.2, 10.1, 10.0, 9.x, 8.x, 7.x # CVE : CVE-2015-2125 1. Create website that exploits vulnerability. 1.1. Website that steals files using OOB technique: 1.1.1. Website that triggers vulnerability:
1.1.2. file.xml file that is served on attacker's host. This file specifies which file should be retrieved from remote host and where content of that file should be sent: "> 1.2. Website that steals hashes of Administrator user: 1.2.1. Website that triggers vulnerability:
1.2.2. Attacker needs to start tool on the server that captures hashes. 2. Exploit is triggered while profiling or scanning created application using vulnerable versions of HP WebInspect.