CVE-2020-7875

7.5 HIGH

📋 TL;DR

CVE-2020-7875 is a remote code execution vulnerability in DEXT5 Upload's ActiveX module that allows attackers to download and execute arbitrary files by manipulating module arguments. This affects users of DEXT5 Upload version 5.0.0.117 and earlier. The vulnerability can be exploited through web applications that use the vulnerable ActiveX control.

💻 Affected Systems

Products:
  • DEXT5 Upload
Versions: 5.0.0.117 and earlier
Operating Systems: Windows (ActiveX requires Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ActiveX to be enabled in Internet Explorer or applications using the vulnerable control.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, installing malware, stealing data, and using the system as a pivot point for lateral movement.

🟠

Likely Case

Remote code execution leading to malware installation, data exfiltration, or ransomware deployment on vulnerable systems.

🟢

If Mitigated

Limited impact through network segmentation and application controls, potentially only affecting isolated systems.

🌐 Internet-Facing: HIGH - Web applications using the vulnerable ActiveX control can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal web applications using the control remain vulnerable but require internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into visiting malicious web pages or compromising web applications using the control.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.0.118 or later

Vendor Advisory: https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36312

Restart Required: No

Instructions:

1. Download latest version from DEXT5 vendor. 2. Uninstall vulnerable version. 3. Install patched version. 4. Test functionality.

🔧 Temporary Workarounds

Disable ActiveX in Internet Explorer

windows

Prevents exploitation through web browsers by disabling ActiveX controls

Set Internet Explorer security settings to disable ActiveX controls

Block DEXT5 Upload ActiveX CLSID

windows

Prevents loading of vulnerable ActiveX control

Use Group Policy to block CLSID: {CLSID of DEXT5 Upload}

🧯 If You Can't Patch

  • Network segmentation to isolate systems using DEXT5 Upload
  • Implement web application firewall rules to block malicious requests targeting the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check DEXT5 Upload version in installed programs or registry: HKEY_LOCAL_MACHINE\SOFTWARE\DEXT5\Upload

Check Version:

reg query "HKLM\SOFTWARE\DEXT5\Upload" /v Version

Verify Fix Applied:

Verify version is 5.0.0.118 or later and test upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file downloads via DEXT5 Upload
  • Suspicious process execution from temporary directories
  • ActiveX loading errors in application logs

Network Indicators:

  • HTTP requests to DEXT5 Upload endpoints with suspicious parameters
  • Outbound connections from systems after DEXT5 Upload usage

SIEM Query:

source="*DEXT5*" AND (event="download" OR event="execute") AND (url="*remote*" OR param="*variable*")

🔗 References

📤 Share & Export