vendor:
                    Persits Software Inc
                by:
                    2009
                an attacker is able to write arbitrary files to arbitrary locations on disk. Code execution occurs by writing to the All Users Startup Programs directory. You may want to combine this module with the use of multi/handler since a user would have to log for the payload to execute."
                        CVSS
                    7.5
                    Directory Traversal
                    CVE-2009-3693
                        CWE
                    Product Name: Persits Software Inc
                    Affected Version From:  NO
                    Affected Version To:  3.0.0.3
                    Patch Exists: Apply the patch provided by the vendor.
                    Related CWE: jduck
                    CPE:  3.0.0.3
                    
							Metasploit: 
							https://www.exploit-db.com/raw/16598						
                    Platforms Tested:  XUpload ActiveX
                    HIGH
                    Persits XUpload ActiveX MakeHttpRequest Directory Traversal
This module exploits a directory traversal in Persits Software Inc's XUpload ActiveX control(version 3.0.0.3) that's included in HP LoadRunner 9.5. By passing a string containing ".." sequences to the MakeHttpRequest method
Mitigation:
					22