Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
Next: HP Info Center
Up: MW6 Technologies QRCode ActiveX
Previous: Enumerating Exported Interfaces
Contents
ExploitationAfter playing around with various functions, it soon becomes obvious that SaveAsBMP and SaveAsWMF happily accept any path provided to save the generated graphic in the specified location. This can make it possible to overwrite existing files with the picture if the user running IE has sufficient access. This is a perfect example of a program using untrusted data and operating on it without any kind of checks. It is likely that the control's author did not consider the security implications of what they were doing. A sample exploit for this vulnerability, written by shinnai, can be found on Milw0rm: http://www.milw0rm.com/exploits/4420.
|