Vulnerability Details : CVE-2009-2011
Public exploit exists!
Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.
Products affected by CVE-2009-2011
- cpe:2.3:a:dxstudio:dx_studio_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:dxstudio:dx_studio_player:3.0.22.0:*:*:*:*:*:*:*
- cpe:2.3:a:dxstudio:dx_studio_player:3.0.12.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-2011
88.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2009-2011
-
Worldweaver DX Studio Player shell.execute() Command Execution
Disclosure Date: 2009-06-09First seen: 2020-04-26exploit/windows/browser/dxstudio_player_execThis module exploits a command execution vulnerability within the DX Studio Player from Worldweaver for versions 3.0.29 and earlier. The player is a browser plugin for IE (ActiveX) and Firefox (dll). When an unsuspecting user visits a web page referring to a speciall
CVSS scores for CVE-2009-2011
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-2011
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-2011
-
http://www.dxstudio.com/forumtopic.aspx?topicid=b4152459-fb5f-4933-b700-b3fbd54f6bfd
-
http://www.securityfocus.com/bid/35273
Worldweaver DX Studio Player Browser Plugin Remote Arbitrary Shell Command Injection VulnerabilityExploit;Patch
-
http://www.securityfocus.com/archive/1/504195/100/0/threaded
-
http://www.vupen.com/english/advisories/2009/1561
Patch;Vendor Advisory
-
http://www.coresecurity.com/content/DXStudio-player-firefox-plugin
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/51035
-
https://www.exploit-db.com/exploits/8922
Worldweaver DX Studio Player < 3.0.29.1 Firefox plugin - Command Injection - Windows remote Exploit
Jump to