The Chilkat XML ChilkatUtil.CkData.1 ActiveX control (ChilkatUtil.dll) 3.0.3.0 and earlier allows remote attackers to create, overwrite, and modify arbitrary files for execution via a call to the (1) SaveToFile, (2) SaveToTempFile, or (3) AppendBinary method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. NOTE: this can be leveraged for remote code execution by accessing files using hcp:// URLs.
References
Link | Resource |
---|---|
http://secunia.com/advisories/31951 | Vendor Advisory |
http://www.securityfocus.com/bid/31332 | |
http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS | Exploit URL Repurposed |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45333 | |
https://www.exploit-db.com/exploits/6537 |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS - Exploit, URL Repurposed |
Information
Published : 2008-09-30 17:22
Updated : 2024-02-14 01:17
NVD link : CVE-2008-4343
Mitre link : CVE-2008-4343
CVE.ORG link : CVE-2008-4343
JSON object : View
Products Affected
chilkat_software
- chilkat_xml_activex_control
CWE
CWE-20
Improper Input Validation