[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    MSIE->WsFakeSrc
From:       Liu Die Yu <liudieyuinchina () yahoo ! com ! cn>
Date:       2003-09-10 5:52:36
[Download RAW message or body]



WsFakeSrc


[tested]
Browser Ver
{ 
MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107;
Encryption: 128-bit;
Patch:; Q810847; 
}
(So, it's far from fully patched.) 
OS Ver: "Windows XP Cn ver"

[demo]
http://www.safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.HTM
or
http://umbrella.mx.tc 
---> WsFakeSrc section
---> WsFakeSrc-MyPage file

[exp]
window.open("javascript:[JpuScript]","_search") 
authorization checks "window.opener". 
but, [VictimWindow].open is always accessible.
so:
window.open("[VictimUrl]","_search");
[VictimIframe].open("javascript:[JpuScript]","_search");
can fool the authorization and execute [JpuScript] in
the search window.


[greetings]
the Pull, dror, guninski, sandblad and "Friedrich L.Bauer".
of course, mom and dad.

best wishes

-----
from http://Umbrella.MX.TC on http://SafeCenter.NET
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic