My First Exploit-DB Submission (HPE Intelligent Management Center dbman Command 10001 Information Disclosure)
Software Link: https://h10145.www1.hpe.com/Downloads/DownloadSoftware.aspx?SoftwareReleaseUId=16759&ProductNumber=JG747AAE&lang=en&cc=us&prodSeriesId=4176535&SaidNumber= Tested on Version: iMC_PLAT_7.1_E0302_Standard_Windows and iMC_PLAT_7.2_E0403_Std_Win Tested on: Windows 7 CVE: CVE-2019-5392 Conversion of Nessus Plugin to Python Exploit Nessus Plugin Name: hp_imc_dbman_cmd_10001_info_disclosure.nasl Description: This vulnerability allows a remote attacker to view the contents of arbitrary directories under the security context of the SYSTEM or root user. See Also: https://www.tenable.com/plugins/nessus/118038 Exploit-DB: https://www.exploit-db.com/exploits/47408 In this exploit, I converted the Nessus Plugin to Python by using Exploit https://www.exploit-db.com/exploits/43198 POC of iMC_PLAT_7.1_E0302_Standard_Windows POC of iMC_PLAT_7.2_E0403_Std_Win