[24407] in bugtraq

home help back first fref pref prev next nref lref last post

A reason for concern over ie's GetObject() vulnerabilities...

daemon@ATHENA.MIT.EDU (freewarecollector@hotmail.com)
Mon Feb 25 18:38:19 2002

Date: 25 Feb 2002 14:09:24 -0000
Message-ID: <20020225140924.7496.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: <freewarecollector@hotmail.com>
To: bugtraq@securityfocus.com



When i read George Guninski's article (on his site) 
about the getobject vulnerability, I wondered how 
feasible it would be to actually open a temp. internet 
file...
Guess what? It can be done fairly simply.  This 
doesn't seem too bad at first, but because most 
major webmail msgs are stored in temp. internet 
files, this causes a pretty vast security glitch.  Instead 
of snitching cookies, somebody can perhaps also 
read mail that you've already deleted...
Not good...
Here's some (still somewhat buggy) proof of concept 
code...
for ie6
www.geocities.com/freedatarecovery/hr6.html
for ie4
www.geocities.com/freedatarecovery/hr4.html

Notes: when prompted, type in getmsg for the 
dosname (that's the file hotmail uses) or ShowLe for 
yahoo
Many error msgs are going to come up, because this 
just stabs in the dark to find a msg.
Comments, questions? email 
freewarecollector@hotmail.com
+jestar


home help back first fref pref prev next nref lref last post