Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method.
References
Link | Resource |
---|---|
http://retrogod.altervista.org/9sg_hp_loadrunner.html | Exploit |
http://secunia.com/advisories/36898 | Vendor Advisory |
http://retrogod.altervista.org/9sg_hp_loadrunner.html | Exploit |
http://secunia.com/advisories/36898 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/9sg_hp_loadrunner.html - Exploit | |
References | () http://secunia.com/advisories/36898 - Vendor Advisory |
Information
Published : 2009-10-13 10:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3693
Mitre link : CVE-2009-3693
CVE.ORG link : CVE-2009-3693
JSON object : View
Products Affected
hp
- loadrunner
persits
- xupload
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')