Re: [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread pdp (architect)
Hi Michal, Nice read! Very complicated though and with too many Ifs, but very interesting. I just want to sum up. As long as the user has a malicious html file stored on their system you know the path to it, the attacker can read local files. You don't need to do this pop-up trick at all. You

Re: [Full-disclosure] Firefox + popup blocker + XMLHttpRequest + srand() = oops

2007-02-05 Thread Michal Zalewski
On Mon, 5 Feb 2007, pdp (architect) wrote: You may as well use a QuickTime .mov/.qtl or a PDF document to open a file:// link . I think it is easier. Sure. You can probably have a file:// link in Open Office / MS Office documents as well; but these all rely on external components, and as such,