First published: Tue Oct 13 2009(Updated: )
Directory traversal vulnerability in the Persits.XUpload.2 ActiveX control (XUpload.ocx) in HP LoadRunner 9.5 allows remote attackers to create arbitrary files via \.. (backwards slash dot dot) sequences in the third argument to the MakeHttpRequest method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Persits XUpload | =2.0 | |
HP LoadRunner | =9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3693 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2009-3693, update to a patched version of the Persits.XUpload.2 ActiveX control or HP LoadRunner that addresses this vulnerability.
CVE-2009-3693 affects the Persits.XUpload.2 ActiveX control version 2.0 and HP LoadRunner version 9.5.
CVE-2009-3693 can be exploited via directory traversal attacks, allowing remote attackers to create arbitrary files on the server.
CVE-2009-3693 was disclosed in December 2009.