[10173] in bugtraq

home help back first fref pref prev next nref lref last post

Re: IE 5.0 security vulnerabilities - %01 bug again

daemon@ATHENA.MIT.EDU (Georgi Guninski)
Mon Apr 12 16:26:20 1999

Date: 	Sat, 10 Apr 1999 20:51:47 +0300
Reply-To: Georgi Guninski <joro@NAT.BG>
From: Georgi Guninski <joro@NAT.BG>
X-To:         Eric Stevens <ejsteven@CS.MILLERSV.EDU>
To: BUGTRAQ@NETSPACE.ORG

Eric Stevens wrote:
>
> Is there any way to exploit this with files that are not recognized as text.

Yes, there is such a way. You must use TDC to read files with extensions
different from .txt or .html.

Demonstration of reading AUTOEXEC.BAT is available at:
http://www.nat.bg/~joro/scrauto.html

> Example, I tried modifying your code to c:\autoexec.bat and
> c:\winnt\win.ini.  Instead of displaying the contents of my autoexec.bat
> file, I instead recieved an Open/Save As dialog.  Open tries to execute the
> bat file or edit the ini file in the temp folder where it was downloaded,
> and save as does the obvious.  This problem exists on both versions of IE5
> that I have access to, 5.00.0708.700 [ships with Windows 2000 Beta 2 build
> 5.00.1877], and 5.00.2014.0216 [a public release].  Hopefully this can't be
> exploited against anything but text files as it's not terribly likely that
> you have any sensitive information sitting around in text files whose names
> are likely to be guessed.
>

Regards,
Georgi Guninski

home help back first fref pref prev next nref lref last post