Vulnerabilities > CVE-2013-4837 - Remote Code Execution vulnerability in HP LoadRunner Virtual User Generator

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
hp
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1832.

Exploit-Db

descriptionHP LoadRunner EmulationAdmin - Web Service Directory Traversal. CVE-2013-4837. Remote exploit for windows platform
idEDB-ID:30209
last seen2016-02-03
modified2013-12-11
published2013-12-11
reportermetasploit
sourcehttps://www.exploit-db.com/download/30209/
titleHP LoadRunner EmulationAdmin - Web Service Directory Traversal

Metasploit

descriptionThis module exploits a directory traversal vulnerability in version 11.52 of HP LoadRunner. The vulnerability exists in the EmulationAdmin web service, specifically in the copyFileToServer method, allowing the upload of arbitrary files. This module has been tested successfully on HP LoadRunner 11.52 on Windows 2003 SP2.
idMSF:EXPLOIT/WINDOWS/HTTP/HP_LOADRUNNER_COPYFILETOSERVER
last seen2020-06-08
modified2017-07-24
published2013-12-10
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb
titleHP LoadRunner EmulationAdmin Web Service Directory Traversal

Nessus

NASL familyWindows
NASL idHP_LOADRUNNER_11_52_1.NASL
descriptionThe version of HP LoadRunner installed on the remote host is prior to 11.52 Patch 1. It is, therefore, affected by multiple vulnerabilities : - Flaws exist in the Virtual User Generator that allow directory traversal outside of a restricted path. These can be exploited by a remote attacker to create files with arbitrary content, thus leading to remote code execution. (CVE-2013-4837, CVE-2013-4838) - A SQL injection vulnerability exists in the Virtual User Generator that allows remote attackers to acquire sensitive information, modify data, or cause a denial of service. (CVE-2013-4839) - A flaw exists in the Virtual User Generator when handling multiple unspecified methods that allows a remote attacker to read, write, or delete arbitrary files, thus leading to information disclosure or the execution of arbitrary code. (CVE-2013-6213)
last seen2020-06-01
modified2020-06-02
plugin id70806
published2013-11-09
reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/70806
titleHP LoadRunner < 11.52 Patch 1 Multiple Vulnerabilities

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/124376/hp_loadrunner_copyfiletoserver.rb.txt
idPACKETSTORM:124376
last seen2016-12-05
published2013-12-11
reportermetasploit.com
sourcehttps://packetstormsecurity.com/files/124376/HP-LoadRunner-EmulationAdmin-Web-Service-Directory-Traversal.html
titleHP LoadRunner EmulationAdmin Web Service Directory Traversal

Saint

bid63475
descriptionHP LoadRunner Virtual User Generator EmulationAdmin service directory traversal
idmisc_mercuryloadrunnerver
osvdb99231
titlehp_loadrunner_emulationadmin_trav
typeremote