header-logo
Suggest Exploit
vendor:
Microsoft Windows XP and Server 2003
by:
Unknown
7.5
CVSS
HIGH
Command-execution vulnerability
78
CWE
Product Name: Microsoft Windows XP and Server 2003
Affected Version From: Internet Explorer 7
Affected Version To: Internet Explorer 7
Patch Exists: YES
Related CWE:
CPE: o:microsoft:windows_xp
Metasploit:
Other Scripts:
Platforms Tested: Windows
2007

Command-execution vulnerability in Microsoft Windows XP and Server 2003 with Internet Explorer 7

The vulnerability allows remote attackers to execute arbitrary commands in the context of users that follow malicious URIs. Attack vectors include following URIs in Mozilla Firefox, Skype, Adobe Acrobat Reader, Miranda, Netscape, and mIRC. The issue in BID 25543 (Mozilla Firefox 2.0.0.6 Unspecified Protocol Handling Command Injection Vulnerability) can also be exploited as an attack vector for this issue.

Mitigation:

Apply the latest security patches and updates from Microsoft.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25945/info

Microsoft Windows XP and Server 2003 with Internet Explorer 7 is prone to a command-execution vulnerability because it fails to properly sanitize input.

Successfully exploiting this issue allows remote attackers to execute arbitrary commands in the context of users that follow malicious URIs.

Known attack vectors include following URIs in these applications:

- Mozilla Firefox in versions prior to 2.0.0.6
- Skype in versions prior to 3.5.0.239
- Adobe Acrobat Reader 8.1
- Miranda 0.7
- Netscape 7.1
- mIRC.

NOTE: Attackers can exploit the issue in BID 25543 (Mozilla Firefox 2.0.0.6 Unspecified Protocol Handling Command Injection Vulnerability) as an attack vector for this issue. 

The following proof-of-concept URI demonstrates this vulnerability:

http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat
mailto:test% ../../../../windows/system32/calc.exe".cmd