HP Mercury Quality Center (QC) 9.2 and earlier, and possibly TestDirector, relies on cached client-side scripts to implement "workflow" and decisions about the "capability" of a user, which allows remote attackers to execute arbitrary code via crafted use of the Open Test Architecture (OTA) API, as demonstrated by modifying (1) common.tds, (2) defects.tds, (3) manrun.tds, (4) req.tds, (5) testlab.tds, or (6) testplan.tds in %tmp%\TD_80, and then setting the file's properties to read-only.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.exposit.co.uk/2009/02/23/vulnerability-in-quality-center/ - | |
References | () http://secunia.com/advisories/34015 - Vendor Advisory | |
References | () http://secunia.com/advisories/34046 - | |
References | () http://www.kb.cert.org/vuls/id/898865 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/501177/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/501219/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/33854 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48860 - |
Information
Published : 2009-02-24 17:30
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5289
Mitre link : CVE-2007-5289
CVE.ORG link : CVE-2007-5289
JSON object : View
Products Affected
hp
- testdirector
- mercury_quality_center
CWE
CWE-264
Permissions, Privileges, and Access Controls