TUCoPS :: Browsers :: bt1039.txt

MSIE NAFfileJPU




NAFfileJPU



[tested]

Browser Ver

{ 

MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107;

Encryption: 128-bit;

Patch:; Q810847; 

}

(So, it's far from fully patched.) 

OS Ver: "Windows XP Cn ver"



[demo]

http://www.safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-MyPage.HTM

or

http://umbrella.mx.tc 

---> NAFfileJPU section

---> NAFfileJPU-MyPage file



[exp]

try this Url in your browser:

file:javascript:alert(123)



yeah. "file" protocol is a good thing for bypassing

URL-based security check.

one vulnerable function is

"window.external.NavigateAndFind" method.



you should have already known this:

top window and its iframe/frame share the same

"external" object.

so, BadSon method to conquer the "external" object.





[how]

how to get "file:javascript:" trick?

think about "mhtml:http:" for a while and i believed

there would be more.



[greetings]

the Pull, dror, guninski, sandblad and "Friedrich L.Bauer".

of course, mom and dad.



best wishes



-----

from http://Umbrella.MX.TC on http://SafeCenter.NET

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH