HP LoadRunner Web Tours "login.pl" Directory Traversal Vulnerability


Description   A vulnerability has been identified in HP LoadRunner, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code. This issue is caused by an input validation error in the "login.pl" script within Web Tours when processing usernames, which could allow remote attackers to create arbitrary files ona vulnerable system via directory traversal attacks and cause a denial of service or compromise a vulnerable system.
     
Vulnerable Products   Vulnerable Software:
HP LoadRunner version 9.1 and prior
     
Solution   Apply patches LR90P059 and LR90P057.
     
CVE   CVE-2010-4028
     
References   http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02165172
http://aluigi.altervista.org/adv/willycoyote-adv.txt
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Critical 

 Vulnerability First Public Report Date 
2010-10-27 

 Target Type 
Server 

 Possible exploit 
Local & Remote