Web application security - the fast guide 1.1 | Page 96
Chapter 5 - Attack Execution the client
P a g e | 96
Attack requirement:
ActiveX or browser extension has a high privilege.
ActiveX is vulnerable or built as malicious component with attack
purpose.
Attack process
A. victim access a site with vulnerable or malicious Activex or install a
vulnerable or malicious browser extension.
B. Victim accept to run Activex or browser extension.
C. The component is available to provide a back door or to send information
to attacker.
Example:
The following is a list of ActiveX example that can be exploited to attack and
compromise the client.
ActiveX
DHTML
Editing
Microsoft DDS
Library Shape
Control
Vulnerability Impact
LoadURL method can violate
same origin policy Read and write data
Heap memory corruption Arbitrary code execution as
caller
JView Profiler Heap memory corruption
ADODB.Stream None—used to write data
after exploiting LMZ
Shell Application Use CLSID to disguise
malicious file being loaded
Shell.Explorer
HTML Help
Arbitrary code execution as
caller
Files with arbitrary content
placed in known locations
Files with arbitrary content
placed in known locations
Rich folder view drag-n-drop
timing attack Files with arbitrary content
placed in known locations
Stack-based buffer overflow
from overlong “Contents file” Arbitrary code execution as
caller