The Chilkat XML ChilkatUtil.CkData.1 ActiveX control (ChilkatUtil.dll) 3.0.3.0 and earlier allows remote attackers to create, overwrite, and modify arbitrary files for execution via a call to the (1) SaveToFile, (2) SaveToTempFile, or (3) AppendBinary method. NOTE: this issue might only be exploitable in limited environments or non-default browser settings. NOTE: this can be leveraged for remote code execution by accessing files using hcp:// URLs.
References
Configurations
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31951 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/31332 - | |
References | () http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS - Exploit, URL Repurposed | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45333 - | |
References | () https://www.exploit-db.com/exploits/6537 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.shinnai.net/xplits/TXT_rNowA1916DKFNUF48NyS - Exploit, URL Repurposed |
Information
Published : 2008-09-30 17:22
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4343
Mitre link : CVE-2008-4343
CVE.ORG link : CVE-2008-4343
JSON object : View
Products Affected
chilkat_software
- chilkat_xml_activex_control
CWE
CWE-20
Improper Input Validation