============================================================================================================================================= | # Title : Analyzing Legacy ActiveX Execution Behavior via a FastAPI‑Based Delivery Server | | # Author : indoushka | | # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.2 (64 bits) | | # Vendor : System built‑in component. No standalone download available. | ============================================================================================================================================= [+] References : https://packetstorm.news/files/id/212823/ & CVE-2025-54100 [+] Summary : This script is a FastAPI + Uvicorn Proof‑of‑Concept server created for educational and historical analysis related to CVE‑2025‑54100. Important limitations: [!] Does NOT work on modern browsers [!] Does NOT execute real commands today [!] Not a real exploit [!] Safe for educational demonstration only [+] Technical context: The JavaScript payload uses legacy ActiveX calls such as: new ActiveXObject("WScript.Shell").Run("calc.exe"); These techniques only worked in the past under very specific conditions: Internet Explorer ActiveX explicitly enabled Extremely low security settings All modern browsers and operating systems fully block this behavior. [+] What the PoC demonstrates: How ActiveX-based execution was historically dangerous Why Microsoft and browser vendors permanently disabled ActiveX How browser security policies evolved over time Why legacy exploit techniques are no longer viable Why it may appear dangerous to some: The code looks “powerful” The presence of a CVE identifier suggests severity In reality, it relies entirely on deprecated and extinct technologies [+] Purpose: Academic reference Security history education Legacy vulnerability analysis Not intended for exploitation or real‑world attacks [+] Vendor : Microsoft (Internet Explorer – Legacy Components) [+] Affected Products : Internet Explorer (legacy versions with ActiveX enabled) Windows systems where ActiveX and scripting are explicitly allowed [+] Affected Components : WScript.Shell Shell.Application ActiveX scripting interfaces exposed to the browser context [+] Severity : Medium (Historical / Legacy Risk) This issue is considered historical and non‑exploitable on modern browsers. It is relevant for research environments, legacy systems, and defensive analysis only. [+] POC This Proof of Concept (PoC) demonstrates how legacy ActiveX objects in Internet Explorer can be invoked automatically when a crafted HTML payload is delivered by a minimal HTTP server. The PoC shows automatic execution attempts using WScript.Shell and Shell.Application without additional user interaction beyond page rendering. Modern browsers have fully mitigated this behavior by disabling ActiveX. The PoC is intended strictly for educational, defensive, and historical security research. [+] Technical Details : When Internet Explorer is configured to: Allow ActiveX execution Trust the hosting zone Permit scripting of unsafe controls a web page can attempt to instantiate legacy COM objects such as: new ActiveXObject("WScript.Shell") new ActiveXObject("Shell.Application") The PoC delivers an HTML payload that attempts command execution (e.g., launching calc.exe) immediately upon page load. The server also exposes a /log endpoint to demonstrate client‑side execution reporting. [+] PoC Behavior Lightweight HTTP server Serves crafted HTML payload Attempts ActiveX execution on page load Logs client activity to console Supported Environment (PoC) [+] Windows Internet Explorer (legacy) ActiveX enabled Trusted security zone [+] PHP PoC Code : php poc.php