on the border of stating the obvious %5c (backslash) will also work

Aside from that point, you mention the pull's bug as an example of the
consequences however this one would appear to be slightly less serious as
the file protocol doesn't allow authentication of the sort

file://jelmer:password@c://test.txt

thus local files can not be read, you can't execute programs using the
object tag etc

It is pretty serious though, what remains is universal cross site scripting
witch implies you can read the cookies of any domain or can make it look as
if you are browsing a trusted site however the content is under your
control. Thus you can create fake login screens etc without raising
suspicion

--
  jelmer

----- Original Message -----
From: "Dave Ahmad" <[EMAIL PROTECTED]>
To: "Liu Die Yu" <[EMAIL PROTECTED]>
Sent: Wednesday, September 04, 2002 6:32 PM
Subject: Re: MSIEv6 % encoding causes a problem again


>
> I am surprised that nobody has yet commented on this rather serious issue.
> It appears that MSIE fails to properly extract the correct domain from the
> URI string in the parent window when evaluating it against the child
> domain to determine whether access is to be permitted.  This seems to be
> because of the inclusion of "%2f" (HTTP encoded slash character) in a
> URI-specified HTTP username.  I am guessing that the URI parser within
> Explorer decides it has the complete domain once it sees a slash
> without taking into consideration that it could be within a
username/password.
>
> Consequently, the HTTP username "www.yahoo.com" matches the domain of the
> child window ( window.open("www.yahoo.com") ) and access is granted.  This
> violates the "same-origin policy" and has numerous security implications.
>
> In effect, this is similar to other issues found in explorer recently
> (most memorably, that discovered by thePull -
http://online.securityfocus.com/bid/3721).
>
> Mitigating factor:
>
> The attacker must lure the victim to a page where the URI in the location
> bar includes the target website as the username.  Not that the victim
> has much time to do anything about it, this may look suspicious
> (though there could be a way to set the location property, or whichever
> is used, to the target website while keeping the value visible in the
> location bar "normal").
>
> David Ahmad
> Symantec
> http://www.symantec.com/
>
> On 3 Sep 2002, Liu Die Yu wrote:
>
> >
> >
> > it's about cross-site scripting at MSIEv6 client side using % encoding,
> > but not the same as the one by PeaceFire.org which doesn't work on my
PC.
> >
> > [tested]MSIEv6(CN version)
> > {IEXPLORE.EXE file version: 6.0.2600.0000}
> > {MSHTML.DLL file version: 6.00.2600.0000}
> >
> > [demo]
> > at
> > http://www16.brinkster.com/liudieyu/2FforMSIE/2FforMSIE-MyPage.htm
> > or
> > clik.to/liudieyu ==> 2FforMSIE-MyPage section.
> >
> > [exp]
> > %?? in URL is decoded when IE caculates the domain, but not decoded
while
> > downloading a page.
> > so
> > [CODE.URL]http:[EMAIL PROTECTED]/liudieyu
> > ( 2F=hex$(asc('/')) )
> > leads to clik.to/liudieyu instead of www.yahoo.com, and the domain of it
> > www.yahoo.com for IE
> >
> > Very simple, that's all.
> >
> > [contact]
> > [EMAIL PROTECTED]
> >
>
>
>


Reply via email to