vendor:
BlooMooWeb ActiveX Control
by:
SecurityFocus
9.3
CVSS
HIGH
Arbitrary File Download, Arbitrary Code Execution, Arbitrary File Deletion
20
CWE
Product Name: BlooMooWeb ActiveX Control
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
BlooMooWeb ActiveX Control Multiple Vulnerabilities
An attacker can exploit these issues to download arbitrary files, execute arbitrary code within the context of the affected application, and delete arbitrary files. The exploit code contains a JavaScript function spawn2() which calls the GetInstallationDir() method of the vulnerable ActiveX control to get the installation directory of the application. It then calls the BW_DownloadFile() method to download a file from a remote attacker-controlled domain and then calls the BW_LaunchGame() method to execute the downloaded file.
Mitigation:
Upgrade to the latest version of BlooMooWeb ActiveX control.