Vulnerabilities > CVE-2016-4360 - Unspecified vulnerability in HP Loadrunner and Performance Center
Summary
web/admin/data.js in the Performance Center Virtual Table Server (VTS) component in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 through patch 1 do not restrict file paths sent to an unlink call, which allows remote attackers to delete arbitrary files via the path parameter to data/import_csv, aka ZDI-CAN-3555.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Nessus
NASL family Windows NASL id HP_LOADRUNNER_HPSBGN03523.NASL description The version of HP LoadRunner installed on the remote Windows host is 11.52, 12.00, 12.01, 12.02, or 12.50, without the HPSBGN03609 hotfix. It is, therefore, affected by multiple vulnerabilities : - An overflow condition exists in mchan.dll due to a failure to validate the size of a user-supplied string prior to copying it to a stack-based buffer. An unauthenticated, remote attacker can exploit this to cause a stack-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2016-4359) - A flaw exists in the CSV import feature when handling file paths. An unauthenticated, remote attacker can exploit this to delete arbitrary files on the remote system. (CVE-2016-4360) - A flaw exists in the magentservice.exe service that is triggered when handling malformed xdr_string fields in a series of service connection requests. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to crash the service, resulting in a denial of service condition. (CVE-2016-4361) last seen 2020-06-01 modified 2020-06-02 plugin id 91571 published 2016-06-10 reporter This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/91571 title HP LoadRunner 11.52 / 12.00 / 12.01 / 12.02 / 12.50 Multiple Vulnerabilities NASL family General NASL id HP_LOADRUNNER_CVE-2016-4360.NASL description The Hewlett Packard Enterprise (HPE) LoadRunner Virtual Table Server application running on the remote host is affected by a flaw in the import_csv feature due to a failure to restrict file paths sent to an unlink call. An unauthenticated, remote attacker can exploit this to delete arbitrary files on the remote system, resulting in a denial of service condition. Note that LoadRunner reportedly is affected by other vulnerabilities, which can result in a denial of service or remote code execution; however, Nessus has not tested for these. last seen 2020-06-01 modified 2020-06-02 plugin id 91973 published 2016-07-07 reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/91973 title HPE LoadRunner Virtual Table Server import_csv Remote File Deletion DoS NASL family Windows NASL id HP_PERFORMANCE_CENTER_12_53.NASL description The version of HP Performance Center installed on the remote Windows host is 11.52.x or 12.x prior to 12.53. It is, therefore, affected by multiple vulnerabilities : - An overflow condition exists in mchan.dll due to a failure to validate the size of a user-supplied string prior to copying it to a stack-based buffer. An unauthenticated, remote attacker can exploit this to cause a stack-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2016-4359) - A flaw exists in the CSV import feature when handling file paths. An unauthenticated, remote attacker can exploit this to delete arbitrary files on the remote system. (CVE-2016-4360) - A flaw exists in the magentservice.exe service that is triggered when handling malformed xdr_string fields in a series of service connection requests. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to crash the service, resulting in a denial of service condition. (CVE-2016-4361) - A flaw exists in the mchan.dll library due to improper parsing of malformed packets. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to crash the service, resulting in a denial of service condition. (CVE-2016-4384) last seen 2020-06-01 modified 2020-06-02 plugin id 93811 published 2016-09-30 reporter This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/93811 title HP Performance Center 11.52.x / 12.x < 12.53 Multiple Vulnerabilities
References
- http://www.securityfocus.com/bid/90975
- http://www.securityfocus.com/bid/90975
- http://www.securitytracker.com/id/1036006
- http://www.securitytracker.com/id/1036006
- http://www.zerodayinitiative.com/advisories/ZDI-16-364
- http://www.zerodayinitiative.com/advisories/ZDI-16-364
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05157423
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05157423
- https://www.tenable.com/security/research/tra-2016-17
- https://www.tenable.com/security/research/tra-2016-17