The Chilkat XML ChilkatUtil.CkData.1 ActiveX control (ChilkatUtil.dll) 3.0.3.0 and earlier allows remote attackers to create, overwrite, and modify arbitrary files for execution via a call to the (1) SaveToFile, (2) SaveToTempFile, or (3) AppendBinary method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. NOTE: this can be leveraged for remote code execution by accessing files using hcp:// URLs.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/31951 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45333 | vdb entry |
https://www.exploit-db.com/exploits/6537 | exploit |
http://www.securityfocus.com/bid/31332 | vdb entry |
http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS | exploit url repurposed |