|
|||
Rule General Information |
---|
Release Date: | 2019-07-02 | |
Rule Name: | Persits XUpload ActiveX Method MakeHttpRequest Code Execution Vulnerability (CVE-2009-3693) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | http://retrogod.altervista.org/9sg_hp_loadrunner.html |
|
Solutions |
---|
The vendors dont't have released upgrade patches to fix vulnerabilities, for further information, please visit: http://www8.hp.com/us/en/home.html |