module

AwingSoft Winds3D Player 3.5 SceneURL Download and Execute

Disclosed
2009-11-14
Created
2018-05-30

Description

This module exploits an untrusted program execution vulnerability within the
Winds3D Player from AwingSoft. The Winds3D Player is a browser plugin for
IE (ActiveX), Opera (DLL) and Firefox (XPI). By setting the 'SceneURL'
parameter to the URL to an executable, an attacker can execute arbitrary
code.

Testing was conducted using plugin version 3.5.0.9 for Firefox 3.5 and
IE 8 on Windows XP SP3.

Author

jduck jduck@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/browser/awingsoft_winds3d_sceneurl
msf exploit(awingsoft_winds3d_sceneurl) > show targets
...targets...
msf exploit(awingsoft_winds3d_sceneurl) > set TARGET < target-id >
msf exploit(awingsoft_winds3d_sceneurl) > show options
...show and set options...
msf exploit(awingsoft_winds3d_sceneurl) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.