Microsoft Internet Explorer Zone欺骗漏洞

Microsoft Internet Explorer Zone欺骗漏洞

漏洞ID 1106499 漏洞类型 输入验证
发布时间 2001-10-10 更新时间 2005-10-12
图片[1]-Microsoft Internet Explorer Zone欺骗漏洞-安全小百科CVE编号 CVE-2001-0664
图片[2]-Microsoft Internet Explorer Zone欺骗漏洞-安全小百科CNNVD-ID CNNVD-200110-123
漏洞平台 Windows CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/21118
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200110-123
|漏洞详情
InternetExplorer5.5版本和5.01版本存在漏洞。远程攻击者可以借助含不带电IP地址的畸形URL绕过安全限制,该漏洞导致InternetExplorer处理IntranetZone中的页面,并且可能有较少的安全限制,也称为”ZoneSpoofingvulnerability”。
|漏洞EXP
source: http://www.securityfocus.com/bid/3420/info

Microsoft Internet Explorer contains a security-setting feature that can be modified according to a user's preferences. These settings control what actions a web site can take on a user's system.

A vulnerability exists in Internet Explorer, which could allow a web site to be viewed in the Local Intranet Zone, rather than the Internet Zone. Thus, allowing content to be viewed with less-restrictive security settings.

Converting the IP address of the target web site into a dotless IP address, and submitting it, will cause Internet Explorer to view the web site in the Local Intranet zone.

* Microsoft Security Bulletin MS01-055 states that there is a new variant of this issue, although no technical details have been provided. A cumulative patch has been released and IE 5.5 users are encouraged to install it. 

Example:

An option in a basic authenticated site is to pass on a username (and/or
password) in the URL like this:

http://[email protected]

Another possibility is to convert an IP address into a dotless IP address;
such an address is also called a DWORD address (some proxy servers, routers
or web servers do not allow this).

http://msdn.microsoft.com - IP: 207.46.239.122

Convert this IP address to a DWORD address:

207 * 16777216 = 3472883712
46 * 65536 = 3014656
239 * 256 = 61184
122 * 1 = 122
------------------------------------------------ +
= 3475959674

This DWORD address can be used to visit the site like:

http://3475959674
If we combine the URL login option with the DWORD IP address we'll get the
following URL:

http://mike@3475959674

The browser still thinks we are in the internet zone as expected.

Now we change the @ sign to its ASCII equivalent (%40):


------------------------
http://mike%403475959674
------------------------
|参考资料

来源:MS
名称:MS01-051
链接:http://www.microsoft.com/technet/security/bulletin/MS01-051.asp
来源:XF
名称:ie-incorrect-security-zone(7258)
链接:http://xforce.iss.net/static/7258.php
来源:BID
名称:3420
链接:http://www.securityfocus.com/bid/3420
来源:OSVDB
名称:1971
链接:http://www.osvdb.org/1971
来源:morph3us.org
链接:http://morph3us.org/blog/?p=31
来源:BUGTRAQ
名称:20011011SerioussecurityFlawinMicrosoftInternetExplorer-ZoneSpoofing
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=100281551611595&w;=2

相关推荐: Virtual Programming VP-ASP shopdisplayproducts.asp SQL Injection Vulnerability

Virtual Programming VP-ASP shopdisplayproducts.asp SQL Injection Vulnerability 漏洞ID 1099164 漏洞类型 Input Validation Error 发布时间 2003-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享