Rapid7 Vulnerability & Exploit Database

Black Ice Cover Page ActiveX Control Arbitrary File Download

Back to Search

Black Ice Cover Page ActiveX Control Arbitrary File Download

Disclosed
06/05/2008
Created
05/30/2018

Description

This module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0). Code execution can be achieved by first uploading the payload to the remote machine, and then upload another mof file, which enables Windows Management Instrumentation service to execute the binary. Please note that this module currently only works for Windows before Vista. Also, a similar issue is reported in BIDIB.ocx (10.9.3.0) within the Barcode SDK.

Author(s)

  • shinnai
  • mr_me <steventhomasseeley@gmail.com>
  • sinn3r <sinn3r@metasploit.com>

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/browser/blackice_downloadimagefileurl
msf exploit(blackice_downloadimagefileurl) > show targets
    ...targets...
msf exploit(blackice_downloadimagefileurl) > set TARGET < target-id >
msf exploit(blackice_downloadimagefileurl) > show options
    ...show and set options...
msf exploit(blackice_downloadimagefileurl) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;