TUCoPS :: Browsers :: hack7809.htm

IE6 vuln - Local File Detection
IE6 Vulnerability - Local File Detection

Affected Software : Microsoft Internet Explorer
Vulnerability : Local File Detection

Tested On : MS IE 6.0 SP1, Win2K SP4, [up-to-date]
according to windowsupdate.com

Discovered by : Gregory R. Panakkal

This security vulnerability in Internet Explorer
allows remote attackers to discover what software is
installed on the remote computer, by testing for the
existence of certain files. 

The "sysimage://" protocol is used to display the
appropriate icon corresponding to a  file path when
viewed from MSIE. The default behaviour is such, that
if a existing file-path is given as input, it displays
the approritate icon [as described above], but if the
file-path supplied doesn't exists, it loads the icon
of a folder instead [ie, it gives out no error].

But as always, there is a way to bypass it.. and let
us differentiate between a valid path and an invalid
one, and thus using the onLoad and onError event
handlers, the 'local file detection' is a piece of

There isn't much of a documentation on the net
regarding the "sysimage://", atleast google didn't
show up anything useful :(

Proof Of Concept


A demonstration is available at the following URL.

http://crapware.lx.ro/junkcode/security/ie-sp1-sysimage-local-file-exist ence.htm

Greetz to
Liu Die Yu, Rakesh Balasunder

Gregory R. Panakkal 
(aka JunkCode / Viper)

Yahoo! India Matrimony: Find your life partner online
Go to: http://yahoo.shaadi.com/india-matrimony 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH