CVE-2014-0773

Severity CVSS v4.0:
Pending analysis
Type:
CWE-77 Command Injection
Publication date:
12/04/2014
Last modified:
19/09/2025

Description

The BWOCXRUN.BwocxrunCtrl.1 control contains a method named <br /> “CreateProcess.” This method contains validation to ensure an attacker <br /> cannot run arbitrary command lines. After validation, the values <br /> supplied in the HTML are passed to the Windows CreateProcessA API.<br /> <br /> <br /> The validation can be bypassed allowing for running arbitrary command<br /> lines. The command line can specify running remote files (example: UNC <br /> command line).<br /> <br /> <br /> A function exists at offset 100019B0 of bwocxrun.ocx. Inside this <br /> function, there are 3 calls to strstr to check the contents of the user <br /> specified command line. If “\setup.exe,” “\bwvbprt.exe,” or <br /> “\bwvbprtl.exe” are contained in the command line (strstr returns <br /> nonzero value), the command line passes validation and is then passed to<br /> CreateProcessA.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:advantech:advantech_webaccess:*:*:*:*:*:*:*:* 7.1 (including)
cpe:2.3:a:advantech:advantech_webaccess:5.0:*:*:*:*:*:*:*
cpe:2.3:a:advantech:advantech_webaccess:6.0:*:*:*:*:*:*:*
cpe:2.3:a:advantech:advantech_webaccess:7.0:*:*:*:*:*:*:*