Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method.
References
Link | Resource |
---|---|
http://secunia.com/advisories/36898 | Vendor Advisory |
http://retrogod.altervista.org/9sg_hp_loadrunner.html | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2009-10-13 03:30
Updated : 2009-10-13 03:30
NVD link : CVE-2009-3693
Mitre link : CVE-2009-3693
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
hp
- loadrunner
persits
- xupload