[DSECRG-09-006] Synactis All_IN_THE_BOX ActiveX Control - Null byte File Owervrite Synactis All_IN_THE_BOX ActiveX Control (ALL_IN_THE_BOX.OCX) can be used to owervrite any any file in target system. Vulnerable method is "SaveDoc()" Application: Synactis All_IN_THE_BOX ActiveX Versions Affected: 3 Vendor URL: http://synactis.com Bugs: Null byte File overwriting Exploits: YES Reported: 15.01.2009 Vendor response: NONE Second Report: 22.01.2009 Vendor response: NONE Date of Public Advisory: 30.01.2009 Authors: Digital Security Research Group [DSecRG] (research [at] dsec [dot] ru) Details ******* By default All_IN_THE_BOX ActiveX control save attend extension to filename variable in "SaveDoc()" method. For example if you enterfile name "boot.ini" in "SaveDoc()" method then control will create file boot.ini.box. But by attending a null byte to filename attacker can owervrite any file in OS (see example) Class AllBox GUID: {B5576893-F948-4E0F-9BE1-A37CB56D66FF} Number of Interfaces: 1 Default Interface: IAllBox RegKey Safe for Script: False RegkeySafe for Init: False KillBitSet: False Example: ******* Test Exploit page Fix Information *************** No patches available. We did not get any response from vendor for 2 weeks. About ***** Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website. Contact: research [at] dsec [dot] ru http://www.dsecrg.com http://www.dsec.ru