Gudinna Wiki VisaÄndraBifogaVersionerUppdateratSökKarta

Using the backbutton in IE is dangerous.

Title: Using the backbutton in IE is dangerous.
Date: [2002-04-15]
Software: At least Internet Explorer 6.0.
Tested env: Windows 2000 pro, XP.
Rating: Medium because user interaction is needed.
Impact: Read cookies/local files and execute code
(triggered when user hits the back button).
Patch: None.
Vendor: Microsoft contacted 12 Nov 2001, additional
information given 25 Mar 2002.
Workaround: Disable active scripting or never
use the back button.
Author: Andreas Sandblad,

IE allows urls containing the javascript protocoll in the history list.
Code injected in the url will operate in the same zone/domain as the last
url viewed. The javascript url can be set to trigger when a user presses
the backbutton.

The normal behaviour when a page fails to load is to press the backbutton.
The error page shown by IE is operating in the local computer zone
(res://C:\WINNT\System32\shdoclc.dll/dnserror.htm# on Win2000). Thus, we
can execute code and read local files.

The exploit works as follow: Press one of the links and then the back

Note: Exploit has only been tested on fully patched IE 6.0, with Win XP
and Win2000 pro (assume other OS are also vulnerable). Winmine.exe and
test.txt must exist.

Press link and then the backbutton to trigger script.

Run Minesweeper (c:/winnt/system32/winmine.exe Win2000 pro)
Run Minesweeper (c:/windows/system32/winmine.exe XP, ME etc...)
Read c:\test.txt (needs to be created)
Read Google cookie

Andreas Sandblad is not responsible for the misuse of the
information provided in this advisory. The opinions expressed
are my own and not of any company. In no event shall the author
be liable for any damages whatsoever arising out of or in
connection with the use or spread of this advisory. Any use of
the information is at the user's own risk.

Please send suggestions and comments to:

Referens till aktuell sida

Frivillig gåva till stöd för driften av Gudinna Wiki :