File Path Manipulation Vulnerability in HPE LoadRunner and Performance Center
CVE-2016-4360
9.1CRITICAL
Summary
A vulnerability in the web/admin/data.js file of the Performance Center Virtual Table Server (VTS) component allows remote attackers to exploit unrestricted file paths sent to an unlink call. By manipulating the path parameter in a data/import_csv request, an attacker could potentially delete arbitrary files on the server, posing a significant security risk to data integrity and system stability.
References
EPSS Score
6% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved