[DSECRG-09-006] Synactis All_IN_THE_BOX ActiveX Control - Null byte File Owervrite
Synactis All_IN_THE_BOX ActiveX Control (ALL_IN_THE_BOX.OCX) can be used to owervrite any any file in target system. Vulnerable method is "SaveDoc()"
Application: Synactis All_IN_THE_BOX ActiveX
Versions Affected: 3
Vendor URL: http://synactis.com
Bugs: Null byte File overwriting
Exploits: YES
Reported: 15.01.2009
Vendor response: NONE
Second Report: 22.01.2009
Vendor response: NONE
Date of Public Advisory: 30.01.2009
Authors: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)
Details
*******
By default All_IN_THE_BOX ActiveX control save attend extension to filename variable in "SaveDoc()" method.
For example if you enterfile name "boot.ini" in "SaveDoc()" method then control will create file boot.ini.box.
But by attending a null byte to filename attacker can owervrite any file in OS (see example)
Class AllBox
GUID: {B5576893-F948-4E0F-9BE1-A37CB56D66FF}
Number of Interfaces: 1
Default Interface: IAllBox
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False
Example:
*******
Test Exploit page
Fix Information
***************
No patches available.
We did not get any response from vendor for 2 weeks.
About
*****
Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.
Contact: research [at] dsec [dot] ru
http://www.dsecrg.com
http://www.dsec.ru