Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution - Nessus

High   Plugin ID: 34491

This page contains detailed information about the Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 34491
Name: Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution
Filename: husdawg_srl_activex_code_execution.nasl
Vulnerability Published: N/A
This Plugin Published: 2008-10-25
Last Modification Time: 2022-04-11
Plugin Version: 1.16
Plugin Type: local
Plugin Family: Windows
Dependencies: smb_hotfixes.nasl
Required KB Items [?]: SMB/Registry/Enumerated

Vulnerability Information


Severity: High
Vulnerability Published: N/A
Patch Published: N/A
CVE [?]: CVE-2008-4385
CPE [?]: N/A

Synopsis

The remote Windows host has an ActiveX control that could allow arbitrary code execution.

Description

Instant Expert Analysis from Husdawg System Requirements Lab is installed on the remote host. Instant Expert Analysis software allows websites to perform one-click software/hardware analysis of remote systems.

An ActiveX component used by Instant Expert Analysis can be exploited to download and execute malicious code from an unauthorized website. Although, the software uses a signed Java applet to download and execute files, it may be possible to execute code without any user interaction if the applet is previously signed on an authorized website.

Reportedly either file 'sysreqlab.dll', 'sysreqlabsli.dll', or 'sysreqlab2.dll' is affected by this issue.

Solution

Upgrade to Husdawg System Requirements Lab 3.

Public Exploits


Target Network Port(s): 139, 445
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework, Exploit-DB)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution vulnerability:

  1. Metasploit: exploit/windows/browser/systemrequirementslab_unsafe
    [Husdawg, LLC. System Requirements Lab ActiveX Unsafe Method]
  2. Exploit-DB: exploits/windows/remote/16552.rb
    [EDB-16552: Husdawg_ LLC. System Requirements Lab - ActiveX Unsafe Method (Metasploit)]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVSS Base Score:9.3 (High)
Impact Subscore:10.0
Exploitability Subscore:8.6
CVSS Temporal Score:7.7 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:7.7 (High)

Go back to menu.

Plugin Source


This is the husdawg_srl_activex_code_execution.nasl nessus plugin source code. This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.

#%NASL_MIN_LEVEL 70300
#
#  (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(34491);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2008-4385");
  script_bugtraq_id(31752);
  script_xref(name:"CERT", value:"166651");
  script_xref(name:"SECUNIA", value:"32236");

  script_name(english:"Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that could allow
arbitrary code execution.");
  script_set_attribute(attribute:"description", value:
"Instant Expert Analysis from Husdawg System Requirements Lab is
installed on the remote host.  Instant Expert Analysis software allows
websites to perform one-click software/hardware analysis of remote
systems. 

An ActiveX component used by Instant Expert Analysis can be exploited
to download and execute malicious code from an unauthorized website. 
Although, the software uses a signed Java applet to download and
execute files, it may be possible to execute code without any user
interaction if the applet is previously signed on an authorized
website. 

Reportedly either file 'sysreqlab.dll', 'sysreqlabsli.dll', or
'sysreqlab2.dll' is affected by this issue.");
  script_set_attribute(attribute:"see_also", value:"http://content.systemrequirementslab.com.s3.amazonaws.com/docs/security_bulletin_1.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Husdawg System Requirements Lab 3.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Husdawg, LLC. System Requirements Lab ActiveX Unsafe Method');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_cwe_id(94);

  script_set_attribute(attribute:"plugin_publication_date", value:"2008/10/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);


# Locate the file used by the control.
if (activex_init() != ACX_OK) exit(0);

clsids = make_list(
  "{67A5F8DC-1A4B-4D66-9F24-A704AD929EEE}",
  "{BE833F39-1E0C-468C-BA70-25AAEE55775E}",
  "{BE833F39-1E0C-468C-BA70-25AAEE55775F}"
);

info = NULL;
foreach clsid (clsids)
{
 file = activex_get_filename(clsid:clsid);

 if (file)
 {
   # Check its version.
   ver = activex_get_fileversion(clsid:clsid);

   # Current version of sysreqlab3.dll == 3.0.0.2
   if (ver && activex_check_fileversion(clsid:clsid, fix:"3.0.0.2") == TRUE)
    {
      if (report_paranoia > 1 || activex_get_killbit(clsid:clsid) == 0)
       {
        info += '  - ' + clsid + '\n' +
                '    ' + file + ', ' + ver + '\n';

        if (!thorough_tests) break;
       } 
    }
  }
}

activex_end();

if (info)
{
  if (report_verbosity)
  {
    if (report_paranoia > 1)	
    {
      report = string(
        "\n",
     	"Nessus found the following affected control(s) installed :\n",
     	"\n",
    	info,
      	"\n",
        "Note that Nessus did not check whether the kill bit was set for\n",
        "the control(s) because of the Report Paranoia setting in effect\n",
        "when this scan was run.\n"
      );
    }
    else
    {
      report = string(
        "\n",
        "Nessus found the following affected control(s) installed :\n",
        "\n",
        info,
        "\n",
        "Moreover, the kill bit was  not set for the control(s) so they\n",
        "are accessible via Internet Explorer.\n"
      );
    }
    security_hole(port:kb_smb_transport(), extra:report);
  }	  	 
  else security_hole(kb_smb_transport());
} 

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/husdawg_srl_activex_code_execution.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\husdawg_srl_activex_code_execution.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/husdawg_srl_activex_code_execution.nasl

Go back to menu.

How to Run


Here is how to run the Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Windows plugin family.
  6. On the right side table select Husdawg System Requirements Lab Multiple ActiveX Remote Code Execution plugin ID 34491.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl husdawg_srl_activex_code_execution.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a husdawg_srl_activex_code_execution.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - husdawg_srl_activex_code_execution.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state husdawg_srl_activex_code_execution.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: CERT | Computer Emergency Response Team: Secunia Advisory: CWE | Common Weakness Enumeration:
  • CWE-94 (Weakness) Improper Control of Generation of Code ('Code Injection')
See also: Similar and related Nessus plugins:
  • 30219 - MySpace Uploader ActiveX Control < 1.0.0.6 Action Property Buffer Overflow
  • 31049 - Ask.com Toolbar AskJeevesToolBar.SettingsPlugin.1 ActiveX (askBar.dll) ShortFormat Property Arbitrary Code Execution
  • 31136 - Novell iPrint Control ActiveX (ienipp.ocx) ExecuteRequest() Method Overflow
  • 31348 - EDraw Office Viewer ActiveX (EDraw.OfficeViewer) FtpDownloadFile Method Overflow
  • 31351 - Symantec Backup Exec Calendar ActiveX Control Multiple Vulnerabilities (SYM08-007)
  • 31418 - RealPlayer ActiveX (rmoc3260.dll) Console Property Memory Corruption Arbitrary Code Execution
  • 31731 - CA BrightStor ARCserve Backup ListCtrl ActiveX (ListCtrl.ocx) AddColumn() Method Overflow
  • 32082 - Akamai Download Manager ActiveX Control < 2.2.3.5 Remote Code Execution
  • 32442 - Creative Software AutoUpdate Engine ActiveX (CTSUEng.ocx) Unspecified Overflow
  • 33102 - Akamai Download Manager ActiveX Control < 2.2.3.6 Arbitrary File Download
  • 33227 - Novell iPrint Client for Windows ienipp.ocx ActiveX Multiple Variable Overflow
  • 33484 - Sony ImageStation AxRUploadServer.AxRUploadControl ActiveX (AxRUploadServer.dll) SetLogging Method Overflow
  • 33859 - WebEx Meeting Manager WebexUCFObject ActiveX Control Buffer Overflow
  • 34021 - Anzio Web Print Object (WePO) ActiveX mainurl Parameter Buffer Overflow
  • 34049 - Novell iPrint Client ActiveX Control Multiple Vulnerabilities
  • 34348 - GdPicture Multiple ActiveX Control SaveAsPDF Method Arbitrary File Overwrite
  • 34472 - LPViewer ActiveX Control Multiple Buffer Overflow Vulnerabilities
  • 35403 - Symantec AppStream Client LaunchObj ActiveX Control Multiple Unsafe Methods (SYM09-001)
  • 35627 - AutoDesk LiveUpdate ActiveX Control ApplyPatch Method Execution
  • 35634 - MS KB960715: Cumulative Security Update of ActiveX Kill Bits
  • 35953 - Morovia Barcode ActiveX Control < 3.6.0 Arbitrary File Overwrite
  • 36087 - Autodesk IDrop ActiveX Control Heap Corruption
  • 36163 - SAP GUI KWEdit ActiveX Control SaveDocumentAs() Insecure Method
  • 38734 - Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflows
  • 38977 - IBM Access Support ActiveX Control GetXMLValue Method Overflow
  • 40617 - SAP SAPgui MDrmSap ActiveX (mdrmsap.dll) Buffer Overflow
  • 41062 - Altiris Altiris.AeXNSPkgDL.1 ActiveX Control DownloadAndInstall() Method Arbitrary Code Execution
  • 41945 - FlexCell Grid FlexCell.Grid ActiveX Control Multiple Method Arbitrary File Overwrite
  • 42372 - Altiris ConsoleUtilities 'BrowseAndSaveFile()' ActiveX Control Buffer Overflow
  • 42977 - Altiris ConsoleUtilities ActiveX RunCmd Method Overflow
  • 45593 - HP Operations Manager SourceView ActiveX LoadFile / SaveFile Stack Overflows
  • 49707 - Trend Micro Internet Security Pro UfProxyBrowserCtrl ActiveX extSetOwner Function Arbitrary Code Execution
  • 51894 - SigPlus Pro ActiveX Control LCDWriteString() Method HexString Parameter Overflow
  • 54841 - Data Dynamics ActiveBar ActiveX Controls Code Execution

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file husdawg_srl_activex_code_execution.nasl version 1.16. For more plugins, visit the Nessus Plugin Library.

Go back to menu.