Argument injection vulnerability in orbitmxt.dll 2.1.0.2 in the Orbit Downloader 2.8.7 and earlier ActiveX control allows remote attackers to overwrite arbitrary files via whitespace and a command-line switch, followed by a full pathname, in the third argument to the download method.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.waraxe.us/advisory-73.html | exploit |
http://www.securityfocus.com/bid/34200 | vdb entry |
https://www.exploit-db.com/exploits/8257 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49353 | vdb entry |