|
NAFfileJPU [tested] Browser Ver { MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107; Encryption: 128-bit; Patch:; Q810847; } (So, it's far from fully patched.) OS Ver: "Windows XP Cn ver" [demo] http://www.safecenter.net/liudieyu/NAFfileJPU/NAFfileJPU-MyPage.HTM or http://umbrella.mx.tc ---> NAFfileJPU section ---> NAFfileJPU-MyPage file [exp] try this Url in your browser: file:javascript:alert(123) yeah. "file" protocol is a good thing for bypassing URL-based security check. one vulnerable function is "window.external.NavigateAndFind" method. you should have already known this: top window and its iframe/frame share the same "external" object. so, BadSon method to conquer the "external" object. [how] how to get "file:javascript:" trick? think about "mhtml:http:" for a while and i believed there would be more. [greetings] the Pull, dror, guninski, sandblad and "Friedrich L.Bauer". of course, mom and dad. best wishes ----- from http://Umbrella.MX.TC on http://SafeCenter.NET