HP Mercury Quality Center (QC) 9.2 and earlier, and possibly TestDirector, relies on cached client-side scripts to implement "workflow" and decisions about the "capability" of a user, which allows remote attackers to execute arbitrary code via crafted use of the Open Test Architecture (OTA) API, as demonstrated by modifying (1) common.tds, (2) defects.tds, (3) manrun.tds, (4) req.tds, (5) testlab.tds, or (6) testplan.tds in %tmp%\TD_80, and then setting the file's properties to read-only.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/34046 | third party advisory |
http://www.securityfocus.com/archive/1/501177/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/33854 | vdb entry |
http://secunia.com/advisories/34015 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/48860 | vdb entry |
http://www.kb.cert.org/vuls/id/898865 | third party advisory us government resource |
http://www.securityfocus.com/archive/1/501219/100/0/threaded | mailing list |
http://blogs.exposit.co.uk/2009/02/23/vulnerability-in-quality-center/ |