vendor:
Crystal Reports Viewer
by:
Dr_IDE
7,5
CVSS
HIGH
ActiveX Exploit
119
CWE
Product Name: Crystal Reports Viewer
Affected Version From: 12.0.0.549
Affected Version To: 12.0.0.549
Patch Exists: NO
Related CWE: N/A
CPE: a:sap:crystal_reports_viewer:12.0.0.549
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
Crystal Reports Viewer 12.0.0.549 Activex Exploit (PrintControl.dll) 0-day
This exploit is for Crystal Reports Viewer 12.0.0.549. It is a 0-day exploit and uses the PrintControl.dll file located in the ActiveXControls folder of the CrystalReportViewers12 directory. The exploit uses the ServerResourceVersion method of the CrystalPrintControlLib.CrystalPrintControl ProgID to execute a Windows/exec payload with the command calc.exe. The exploit was tested on a Windows XPSP3 VM with IE 7.0.5730.13, however it was not 100% reliable.
Mitigation:
Disable ActiveX controls in the browser, or use a browser that does not support ActiveX.