Vulnerabilities > CVE-2013-2370 - Remote Code Execution vulnerability in HP LoadRunner

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
hp
exploit available
metasploit

Summary

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1671.

Exploit-Db

descriptionHP LoadRunner lrFileIOService ActiveX Remote Code Execution. CVE-2013-2370. Remote exploit for windows platform
idEDB-ID:27939
last seen2016-02-03
modified2013-08-29
published2013-08-29
reportermetasploit
sourcehttps://www.exploit-db.com/download/27939/
titleHP LoadRunner lrFileIOService ActiveX Remote Code Execution

Metasploit

descriptionThis module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileBinary method where user provided data is used as a memory pointer. This module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the LrWebIERREWrapper.dll 11.50.2216.0. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with HP LoadRunner.
idMSF:EXPLOIT/WINDOWS/BROWSER/HP_LOADRUNNER_WRITEFILEBINARY
last seen2020-06-08
modified2017-10-05
published2013-08-26
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb
titleHP LoadRunner lrFileIOService ActiveX Remote Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/123001/hp_loadrunner_writefilebinary.rb.txt
idPACKETSTORM:123001
last seen2016-12-05
published2013-08-29
reporterrgod
sourcehttps://packetstormsecurity.com/files/123001/HP-LoadRunner-lrFileIOService-ActiveX-Remote-Code-Execution.html
titleHP LoadRunner lrFileIOService ActiveX Remote Code Execution

Saint

bid61441
descriptionHP LoadRunner lrFileIOService ActiveX Control WriteFileBinary Input Validation Error
idmisc_mercuryloadrunnerver
osvdb95640
titlehp_loadrunner_lrfileioservice_writefilebinary_data
typeclient