vendor:
Office Viewer ActiveX Control
by:
Houssamix
9.3
CVSS
HIGH
Remote File execution exploit
94
CWE
Product Name: Office Viewer ActiveX Control
Affected Version From: 3.0.1
Affected Version To: 3.0.1
Patch Exists: Yes
Related CWE: N/A
CPE: a:anydraw:office_viewer_activex_control
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Professional SP2
2009
Office Viewer ActiveX Control v 3.0.1 Remote File execution exploit
This exploit uses the insecure methods 'OpenWebFile()' to execute a remote file on the victim's PC. It can also execute a local file on the victim's PC by changing the function do_it to 'function Do_it() { File = "c:windowssystem32cmd.exe"; hsmx.OpenWebFile(File); }'
Mitigation:
Ensure that the Office Viewer ActiveX Control is up to date and that all security patches are applied.