Overview
The WeOnlyDo! SFTP ActiveX control is incorrectly marked safe for scripting. This may allow a remote unauthenticated attacker to upload arbitrary files from a vulnerable system to an SFTP server or download arbitrary files from an SFTP server to a vulnerable system.
Description
ActiveX ActiveX is a technology that allows programmers to create reusable software components that can be incorporated into applications to extend their functionality. Internet Explorer is a common Windows application that makes use of ActiveX controls. |
Impact
By convincing a victim to view an HTML document (web page, HTML email, or email attachment), an attacker could download arbitrary files to a vulnerable system within the security context of the user running IE. These files could contain code that could be executed through other means. The user may click the file inadvertently, or the file may be placed in a sensitive location, such as the Windows Startup folder where it will automatically execute the next time the user logs onto the system. An attacker can also retrieve arbitrary files from a victim's computer. |
Solution
We are currently unaware of a practical solution to this problem. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Will Dormann of CERT/CC for reporting this vulnerability.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2006-1175 |
Severity Metric: | 5.05 |
Date Public: | 2006-05-30 |
Date First Published: | 2006-05-30 |
Date Last Updated: | 2006-05-31 18:37 UTC |
Document Revision: | 13 |