This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects a remote code vulnerability in Worldweaver DX Studio player which may result in remote execution.
Worldweaver DX Studio is a development environment for creating 3D graphics. The Player application is a browser plugin used for displaying DX Studio documents in Internet Explorer or Firefox.
The application is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data. Specifically, commands sent to the 'shell.execute()' method will execute without warning in the Firefox plugin.
To exploit this issue, attackers must entice an unsuspecting user to use the affected application to view a specially crafted webpage containing malicious DX Studio content.
Attackers can exploit this issue to execute arbitrary shell commands in the context of the vulnerable application.
- Versions prior to DX Studio Player 220.127.116.11 are vulnerable.
Download and install all vendor patches related to this vulnerability.