Description
The SaveDoc method in the All_In_The_Box.AllBox ActiveX control in ALL_IN_THE_BOX.OCX in Synactis ALL In-The-Box ActiveX 3 allows remote attackers to create and overwrite arbitrary files via an argument ending in a '\0' character, which bypasses the intended .box filename extension, as demonstrated by a C:\boot.ini\0 argument.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by DSecRG · textremotewindows
https://www.exploit-db.com/exploits/7928
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33535
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/51693
Various Sources x_refsource_misc
http://www.dsecrg.com/pages/vul/show.php?id=62
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/0298
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33728
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7928
Scores
EPSS
0.0594
EPSS Percentile
90.7%
Details
CWE
CWE-20
Status
published
Products (1)
synactis/all_in_the_box.ocx
3
Published
Feb 10, 2009
Tracked Since
Feb 18, 2026