Vulnerabilities > CVE-2013-4798 - Remote Code Execution vulnerability in HP LoadRunner

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hp
critical
exploit available
metasploit

Summary

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1705.

Exploit-Db

descriptionHP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution. CVE-2013-4798. Remote exploit for windows platform
idEDB-ID:28083
last seen2016-02-03
modified2013-09-04
published2013-09-04
reportermetasploit
sourcehttps://www.exploit-db.com/download/28083/
titleHP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

Metasploit

descriptionThis module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary.
idMSF:EXPLOIT/WINDOWS/BROWSER/HP_LOADRUNNER_WRITEFILESTRING
last seen2020-06-05
modified2019-08-02
published2013-08-29
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb
titleHP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/123086/hp_loadrunner_writefilestring.rb.txt
idPACKETSTORM:123086
last seen2016-12-05
published2013-09-04
reporterjuan vazquez
sourcehttps://packetstormsecurity.com/files/123086/HP-LoadRunner-lrFileIOService-ActiveX-WriteFileString-Remote-Code-Execution.html
titleHP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution

Saint

bid61443
descriptionHP LoadRunner lrFileIOService ActiveX WriteFileString Method Traversal Vulnerability
idmisc_mercuryloadrunnerver
osvdb95642
titlehp_loadrunner_lrfileioservice_writefilestring_traversal
typeclient