ID CVE-2013-2370
Summary Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1671.
References
Vulnerable Configurations
  • HP Loadrunner 11.51
    cpe:2.3:a:hp:loadrunner:11.51
  • HP Loadrunner 11.50
    cpe:2.3:a:hp:loadrunner:11.50
  • HP Loadrunner 11.0.0.0
    cpe:2.3:a:hp:loadrunner:11.0.0.0
  • HP Loadrunner 9.0.0
    cpe:2.3:a:hp:loadrunner:9.0.0
  • HP Loadrunner 9.50.0
    cpe:2.3:a:hp:loadrunner:9.50.0
  • HP Loadrunner 9.51
    cpe:2.3:a:hp:loadrunner:9.51
  • HP Loadrunner 9.52
    cpe:2.3:a:hp:loadrunner:9.52
CVSS
Base: 7.5 (as of 29-07-2013 - 10:44)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description HP LoadRunner lrFileIOService ActiveX Remote Code Execution. CVE-2013-2370. Remote exploit for windows platform
id EDB-ID:27939
last seen 2016-02-03
modified 2013-08-29
published 2013-08-29
reporter metasploit
source https://www.exploit-db.com/download/27939/
title HP LoadRunner lrFileIOService ActiveX Remote Code Execution
metasploit via4
description This module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileBinary method where user provided data is used as a memory pointer. This module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the LrWebIERREWrapper.dll 11.50.2216.0. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with HP LoadRunner.
id MSF:EXPLOIT/WINDOWS/BROWSER/HP_LOADRUNNER_WRITEFILEBINARY
last seen 2019-03-15
modified 2017-10-05
published 2013-08-26
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/hp_loadrunner_writefilebinary.rb
title HP LoadRunner lrFileIOService ActiveX Remote Code Execution
packetstorm via4
data source https://packetstormsecurity.com/files/download/123001/hp_loadrunner_writefilebinary.rb.txt
id PACKETSTORM:123001
last seen 2016-12-05
published 2013-08-29
reporter rgod
source https://packetstormsecurity.com/files/123001/HP-LoadRunner-lrFileIOService-ActiveX-Remote-Code-Execution.html
title HP LoadRunner lrFileIOService ActiveX Remote Code Execution
refmap via4
hp
  • HPSBGN02905
  • SSRT101083
saint via4
bid 61441
description HP LoadRunner lrFileIOService ActiveX Control WriteFileBinary Input Validation Error
id misc_mercuryloadrunnerver
osvdb 95640
title hp_loadrunner_lrfileioservice_writefilebinary_data
type client
Last major update 29-07-2013 - 00:00
Published 29-07-2013 - 09:59
Back to Top