This Metasploit module exploits an expression language injection vulnerability, along with an authentication bypass vulnerability in Hewlett Packard Enterprise Intelligent Management Center before version 7.3 E0504P04 to achieve remote code execution. The HP iMC server suffers from multiple vulnerabilities allows unauthenticated attacker to execute arbitrary Expression Language via the beanName parameter, allowing execution of arbitrary operating system commands as SYSTEM. This service listens on TCP port 8080 and 8443 by default. This Metasploit module has been tested successfully on iMC PLAT v7.3(E0504P02) on Windows 2k12r2 x64 (EN).
b166549e96ca5f700cae312fff860951240a2ec47a3b5fe73610d4185f4d4fe2
HPE Security Bulletin HPESBHF03809 1 - A security vulnerability has been identified in HPE Intelligent Management Center (iMC) PLAT 7.3 E0504P02. This vulnerability could be remotely exploited to allow remote authentication bypass. Revision 1 of this advisory.
899f031fca7ebb415b6fc38f26f55e9f0b3848e6dcc01a5e142117df302c5603