module

Worldweaver DX Studio Player shell.execute() Command Execution

Disclosed
Jun 9, 2009
Created
May 30, 2018

Description

This module exploits a command execution vulnerability within the DX
Studio Player from Worldweaver for versions 3.0.29 and earlier. The
player is a browser plugin for IE (ActiveX) and Firefox (dll). When an
unsuspecting user visits a web page referring to a specially crafted
.dxstudio document, an attacker can execute arbitrary commands.

Testing was conducted using plugin version 3.0.29.0 for Firefox 2.0.0.20
and IE 6 on Windows XP SP3. In IE, the user will be prompted if they
wish to allow the plug-in to access local files. This prompt appears to
occur only once per server host.

NOTE: This exploit uses additionally dangerous script features to write
to local files!

Author

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/browser/dxstudio_player_exec
msf exploit(dxstudio_player_exec) > show targets
...targets...
msf exploit(dxstudio_player_exec) > set TARGET < target-id >
msf exploit(dxstudio_player_exec) > show options
...show and set options...
msf exploit(dxstudio_player_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.