Lucene search

K
zdiAndrea Micalizzi aka rgodZDI-13-203
HistoryAug 13, 2013 - 12:00 a.m.

Hewlett-Packard LoadRunner lrFileIOService ActiveX Control CreateFileCont Remote Code Execution Vulnerability

2013-08-1300:00:00
Andrea Micalizzi aka rgod
www.zerodayinitiative.com
7

0.203 Low

EPSS

Percentile

96.4%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP LoadRunner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the lrFileIOService ActiveX control. The control exposes the CreateFileCont method. The method does not properly sanitize the path for the filename, allowing for directory traversal. An attacker can leverage this vulnerability to write files under the context of the current process, which can then be used to execute code under the context of the current user.

0.203 Low

EPSS

Percentile

96.4%