Vulnerabilities > CVE-2013-4837 - Remote Code Execution vulnerability in HP LoadRunner Virtual User Generator
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1832.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Exploit-Db
description | HP LoadRunner EmulationAdmin - Web Service Directory Traversal. CVE-2013-4837. Remote exploit for windows platform |
id | EDB-ID:30209 |
last seen | 2016-02-03 |
modified | 2013-12-11 |
published | 2013-12-11 |
reporter | metasploit |
source | https://www.exploit-db.com/download/30209/ |
title | HP LoadRunner EmulationAdmin - Web Service Directory Traversal |
Metasploit
description | This module exploits a directory traversal vulnerability in version 11.52 of HP LoadRunner. The vulnerability exists in the EmulationAdmin web service, specifically in the copyFileToServer method, allowing the upload of arbitrary files. This module has been tested successfully on HP LoadRunner 11.52 on Windows 2003 SP2. |
id | MSF:EXPLOIT/WINDOWS/HTTP/HP_LOADRUNNER_COPYFILETOSERVER |
last seen | 2020-06-08 |
modified | 2017-07-24 |
published | 2013-12-10 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/hp_loadrunner_copyfiletoserver.rb |
title | HP LoadRunner EmulationAdmin Web Service Directory Traversal |
Nessus
NASL family | Windows |
NASL id | HP_LOADRUNNER_11_52_1.NASL |
description | The version of HP LoadRunner installed on the remote host is prior to 11.52 Patch 1. It is, therefore, affected by multiple vulnerabilities : - Flaws exist in the Virtual User Generator that allow directory traversal outside of a restricted path. These can be exploited by a remote attacker to create files with arbitrary content, thus leading to remote code execution. (CVE-2013-4837, CVE-2013-4838) - A SQL injection vulnerability exists in the Virtual User Generator that allows remote attackers to acquire sensitive information, modify data, or cause a denial of service. (CVE-2013-4839) - A flaw exists in the Virtual User Generator when handling multiple unspecified methods that allows a remote attacker to read, write, or delete arbitrary files, thus leading to information disclosure or the execution of arbitrary code. (CVE-2013-6213) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 70806 |
published | 2013-11-09 |
reporter | This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/70806 |
title | HP LoadRunner < 11.52 Patch 1 Multiple Vulnerabilities |
Packetstorm
data source | https://packetstormsecurity.com/files/download/124376/hp_loadrunner_copyfiletoserver.rb.txt |
id | PACKETSTORM:124376 |
last seen | 2016-12-05 |
published | 2013-12-11 |
reporter | metasploit.com |
source | https://packetstormsecurity.com/files/124376/HP-LoadRunner-EmulationAdmin-Web-Service-Directory-Traversal.html |
title | HP LoadRunner EmulationAdmin Web Service Directory Traversal |
Saint
bid | 63475 |
description | HP LoadRunner Virtual User Generator EmulationAdmin service directory traversal |
id | misc_mercuryloadrunnerver |
osvdb | 99231 |
title | hp_loadrunner_emulationadmin_trav |
type | remote |