vendor:
Word Viewer OCX
by:
Mountassif Moad a.k.a Stack
9.3
CVSS
HIGH
Remote File execution
94
CWE
Product Name: Word Viewer OCX
Affected Version From: Word viewer OCX V 3.2
Affected Version To: Word viewer OCX V 3.2
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:word_viewer_ocx
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Word viewer OCX V 3.2 Remote File execution exploit
A vulnerability in Word viewer OCX V 3.2 allows remote attackers to execute arbitrary files via a crafted HTML page. The vulnerability is due to the OpenWebFile method of the ActiveX control, which can be called with a URL pointing to a malicious file. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.
Mitigation:
Disable the ActiveX control in the browser or use a third-party application firewall to block the malicious URL.