// For flags

CVE-2012-0190

IBM SPSS ExportHTML.dll ActiveX Control Render Method Remote Code Execution Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document.

Una vulnerabilidad no especificada en el método Render en el control ActiveX ExportHTML.ocx en la librería ExportHTML.dll de IBM SPSS Dimensiones v5.5 y SPSS Data Collection v5.6, v6.0 y v6.0.1 permite a atacantes remotos ejecutar código de su elección a través de un documento HTML específicamente modificado paratal fin.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Render() method exposed by the ExportHTML.dll ActiveX control. This method causes a file to be written to an arbitrary path specified by the second argument (Output). The contents of the file can be controlled by manipulating the object members 'CssLocation', 'LayoutStyle' and 'EmbedCss'. The CssLocation member can be directed to a UNC path containing a file to be included in the file generated by the call to Render(). These behaviors can be exploited by an attacker to execute arbitrary code on the target system.

*Credits: Andrea Micalizzi aka rgod
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-12-14 CVE Reserved
  • 2012-01-18 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-10-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Spss Data Collection
Search vendor "Ibm" for product "Spss Data Collection"
5.6
Search vendor "Ibm" for product "Spss Data Collection" and version "5.6"
-
Affected
Ibm
Search vendor "Ibm"
Spss Data Collection
Search vendor "Ibm" for product "Spss Data Collection"
6.0
Search vendor "Ibm" for product "Spss Data Collection" and version "6.0"
-
Affected
Ibm
Search vendor "Ibm"
Spss Data Collection
Search vendor "Ibm" for product "Spss Data Collection"
6.0.1
Search vendor "Ibm" for product "Spss Data Collection" and version "6.0.1"
-
Affected
Ibm
Search vendor "Ibm"
Spss Dimensions
Search vendor "Ibm" for product "Spss Dimensions"
5.5
Search vendor "Ibm" for product "Spss Dimensions" and version "5.5"
-
Affected