exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Anviz AIM CrossChex Standard 4.3 Excel Macro Injection

Anviz AIM CrossChex Standard 4.3 Excel Macro Injection
Posted Nov 1, 2018
Authored by LiquidWorm | Site zeroscience.mk

CSV (XLS) Injection (Excel Macro Injection or Formula Injection) exists in the AIM CrossChex version 4.3 when importing or exporting users using xls Excel file. This can be exploited to execute arbitrary commands on the affected system via SE attacks when an attacker inserts formula payload in the Name field when adding a user or using the custom fields Gender, Position, Phone, Birthday, Employ Date and Address. Upon importing, the application will launch Excel program and execute the malicious macro formula.

tags | exploit, arbitrary
SHA-256 | 9934935bc5349b6cebbf4d3fe113a6d562530ce82af94be3a16bcc6ed7017ad7

Anviz AIM CrossChex Standard 4.3 Excel Macro Injection

Change Mirror Download

Anviz AIM CrossChex Standard 4.3 Excel Macro Injection


Vendor: Anviz Biometric Technology Co., Ltd.
Product web page: https://www.anviz.com
Affected version: 4.3.6.0

Summary: Access Control and Time Attendance Management
System. Complying with our self-developed fingerprint,
facial, iris, etc. devices, CrossChex Standard integrates
intelligent management of time attendance and relevant
functions of access control. It has been widely used in
many office buildings and factories across the world,
continuously serving access control and management
requests from many companies with stable performance,
accurate calculation, safe management and high intelligence.

Desc: CSV (XLS) Injection (Excel Macro Injection or Formula
Injection) exists in the AIM CrossChex 4.3 when importing
or exporting users using xls Excel file. This can be exploited
to execute arbitrary commands on the affected system via
SE attacks when an attacker inserts formula payload in the
'Name' field when adding a user or using the custom fields
'Gender', 'Position', 'Phone', 'Birthday', 'Employ Date'
and 'Address'. Upon importing, the application will launch
Excel program and execute the malicious macro formula.

Tested on: Microsoft Windows 7 Professional SP1 (EN)


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2018-5498
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5498.php


22.10.2018

--


From the menu:
User -> Add -> use payload: =cmd|' /C mspaint'!L337
User -> Import / Export: use payload: =cmd|' /C mspaint'!L337
Login or Register to add favorites

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close