Microsoft Internet Explorer 6 – URI Handler Restriction Circumvention

Microsoft Internet Explorer 6 – URI Handler Restriction Circumvention

漏洞ID 1053616 漏洞类型
发布时间 2002-09-10 更新时间 2002-09-10
图片[1]-Microsoft Internet Explorer 6 – URI Handler Restriction Circumvention-安全小百科CVE编号 N/A
图片[2]-Microsoft Internet Explorer 6 – URI Handler Restriction Circumvention-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21803
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/5730/info

Microsoft Windows Internet Explorer 6.0 SP1 introduced restrictions for certain URI handlers (such as file:// and res://). It has been demonstrated in the past that these URI handlers could be abused and incorporated into different types of attacks against users of the browser, such as cross-protocol scripting attacks or attacks which access local resources. 

As a safety measure, Service Pack 1 addressed this issue by restricting the client from accessing any of the dangerous URI handlers from the Internet Zone.

However, it is possible to circumvent these restrictions by employing a HTTP redirect to a page which contains one of the restricted URIs.

It is still possible to open any file:// or res:// file automatically with: 

<object type="text/html" data="redirect.asp"></object> 

where redirect.asp makes a HTTP redirect using this HTTP header: 

Location: file://c:/test.txt

相关推荐: FreeBSD tcp_wrappers PARANOID Checking Bypass Vulnerability

FreeBSD tcp_wrappers PARANOID Checking Bypass Vulnerability 漏洞ID 1102938 漏洞类型 Design Error 发布时间 2001-08-23 更新时间 2001-08-23 CVE编号 N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享