Lucene search

K
saintSAINT CorporationSAINT:67159308BA3DD318D6B1553AED35DEA2
HistoryOct 21, 2009 - 12:00 a.m.

HP LoadRunner XUpload ActiveX control MakeHttpRequest file download

2009-10-2100:00:00
SAINT Corporation
download.saintcorporation.com
10

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.932

Percentile

99.1%

Added: 10/21/2009
CVE: CVE-2009-3693
BID: 36550

Background

HP LoadRunner is a software performance testing solution. HP LoadRunner includes the XUpload.ocx ActiveX control for performing file exchanges.

Problem

The **MakeHttpRequest** method in the XUpload.ocx ActiveX control can be used to download arbitrary files without any user confirmation. This can be used to store malicious commands on the system when a user loads an attacker’s web page, leading to command execution.

Resolution

Set the kill bit for Class ID E87F6C8E-16C0-11D3-BEF7-009027438003 as described in Microsoft Knowledge Base Article 240797.

References

<http://secunia.com/advisories/36898&gt;

Limitations

Exploit works on HP LoadRunner 9.5 and requires a user to load the exploit page in Internet Explorer 6 or 7.

After the user loads the exploit page, the exploit will succeed only after the user logs in again or reboots the system.

Platforms

Windows

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.932

Percentile

99.1%

Related for SAINT:67159308BA3DD318D6B1553AED35DEA2