How to avoid vulnerabilities in the embedded version of Firefox
Question ID: 107773

Our Security team has found security vulnerabilities that are in the built-in LoadRunner version of the Firefox browser. Can we upgrade the TruClient Firefox browser for this protocol? If not, can the folder with the Firefox binaries be deleted?

Marked as spam
Posted by (Questions: 144, Answers: 1)
Asked on July 26, 2017 6:39 pm
Answers (1)
Private answer

Firefox browser is part of the LoadRunner deployment and is used for development of scripts in TruClient protocol. This protocol has very strong dependency and can only work with the exact version of the Firefox browser it was built with.

As a result, even if any security vulnerabilities are discovered in the Firefox browser, you cannot upgrade the build-in Firefox version, as it will break the TruClient protocol using Firefox. The upgrade is performed in the next LoadRunner release.

As a workaround, users who do not use TruClient Firefox protocol or have security vulnerabilities with the built-in version of Firefox can remove the Firefox binaries from the installation folder without affecting other functionalities.

To delete the Firefox binaries:

1.Navigate to bin folder.
2.Locate the ''firefox'' folder and delete it.

Once deleted, the folder can be restored by running the ''Repair'' installation procedure.

Marked as spam
Posted by (Questions: 0, Answers: 152)
Answered on July 26, 2017 6:42 pm

Welcome back to "EyeOnTesting" brought to you by Orasi Software, Inc.

Scroll to Top