Working Resources 1.7.x/2.15 BadBlue - 'ext.dll' Command Execution
Author: Matthew Murphy type: remote platform: windows port: date_added: 2003-04-20 date_updated: 2012-11-06 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 22511.txt
source: https://www.securityfocus.com/bid/7387/info BadBlue is prone to a vulnerability that could allow remote attackers to gain unauthorized access. This is due to an input validation issue in the 'ext.dll' component that could allow a remote attacker to cause '.hts' files to be interpreted by the server. This could lead to unauthorized execution of administrative commands. http://www.example.com/ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1 =root&a2=%5C