Working Resources 1.7.x/2.15 BadBlue - 'ext.dll' Command Execution

Author: Matthew Murphy
type: remote
platform: windows
port: 
date_added: 2003-04-20  
date_updated: 2012-11-06  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22511.txt  
source: https://www.securityfocus.com/bid/7387/info

BadBlue is prone to a vulnerability that could allow remote attackers to gain unauthorized access. This is due to an input validation issue in the 'ext.dll' component that could allow a remote attacker to cause '.hts' files to be interpreted by the server. This could lead to unauthorized execution of administrative commands.

http://www.example.com/ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1
=root&a2=%5C