what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IEHTMLHelp.txt

IEHTMLHelp.txt
Posted Nov 5, 2004
Authored by Roozbeh Afrasiabi

The HTML Help Control vulnerability in Internet Explorer that allows for bypass of local zone security restrictions can be further misused to cause cross-domain and cross-zone scripting attacks.

tags | advisory, local
SHA-256 | 4b31cd6edab309f03f68d5ec8fd8f1392c9a85dea523453ed47a5a202524eb32

IEHTMLHelp.txt

Change Mirror Download


TITLE :
Internet Explorer HTML Help Control ActiveX Cross Domain/Zone Scripting Vulnerabilities

Criticality :
Less Critical :)

WHERE :
>From remote
Requires user interaction

IMPACT :
Security Bypass
System Access
Exposure of Sensitive Information

SOFTWARE :
Microsoft Internet Explorer 6

Tested on :
Windows XP SP2

Discovered by:
Roozbeh Afrasiabi
www.persiax.com

Disclaimer :

Roozbeh Afrasiabi is not responsible for the misuse of the information provided in this report. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this advisory. Any use of the information provided here is at the user's own risk.





Description :


The HTML Help Control vulnerability which allows bypass of local zone security restrictions can be further misused to cause cross-domain and cross-zone scripting vulnerabilities.
After a file is opened inside hh.exe using activex there is no restriction to stop injection of script inside this file, the fact that hh.exe can access internet zone could be exploited to load a webpage inside HTML HELP and then inject the malicious script inside this page which results in cross domain vulnerability, the desired script is passed to hh.exe by activex which gets executed in the security zone of the opened file.

When CHM files are opened using activex in HTML HELP it is likely to inject script inside these Files because they are directly opened in Local zone unlike the time they are opened using the showHelp function in internet zone , the injected script gets executed in HTML HELP result of wich is command execution with parameter .



Pocs:


* I have only tested these pocs on my own machine which dose not prove the fact that your machine is vulnerable too ,there is no guarantee that they work correctly on your machine or that the contents of this report are correct about any other machine than mine :)



A) Cross-Domain Scripting vulnerability

http://www.persiax.com/pocs/htmlhelp/cs.htm

what it dose on my machine:
opens http://www.google.com inside hh.exe shows the document cookie [ alert(document.cookie) ] .

B) Cross-Zone Scripting vulnerability

http://www.persiax.com/pocs/htmlhelp/cz.htm

What it dose on my machine:
opens ntshared.chm inside hh.exe and then injects the malicious script inside this file which can execute commands with parameters (for instance shutdown -r)



Contact info:
roozbeh_afrasiabi[at]persiax.com
roozbeh_afrasiabi[at]yahoo.com


Especial thanks to:
http-equiv
Nader Shakerin (man nokare khare sage pedaretam haji)

REFERENCES:

http://www.securityfocus.com/bid/11467
http://secunia.com/advisories/12889/
http://malware.com/noceegar.html
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close