Invalid ContentType may disclose cache directory [tested] OS:WinXp, CN version Microsoft Internet Explorer v6.Sp1; up-to-date on 2003/11/16 [overview] The problem lies in the download function of Internet Explorer. This can be exploited by malicious web pages to get cache directory including random names. [demo] There are two harmless demos: 1st, online demo, powered by ASP: http://www.safecenter.net/UMBRELLAWEBV4/threadid10008/threadid10008-Demo 2nd, demo in ZIP format, powered by NETCAT: http://www.safecenter.net/UMBRELLAWEBV4/threadid10008/threadid10008-Demo.zip [technical details] When CONTENTTYPE in HTTP response is invalid and file extension is "HTM", the downloaded HTM file will be opened in cache directory, in INTERNET security zone. In the 1st demo, this is done by the following ASP code: ---------- response.ContentType = "whocares" response.AddHeader "content-disposition", "inline; filename=test.htm" ---------- In the 2nd demo, this is done with the help of NETCAT. [Workaround] Disable Active Scripting in INTERNET zone, so HTML page opened in the cache can't send information back to the attacker. [Greetings] greetings to: Drew Copley, dror, guninski and mkill. ----- all mentioned resources can always be found at UMBRELLA.MX.TC [people] LiuDieyuinchina [N0-@-Sp2m] yahoo.com.cn UMBRELLA.MX.TC ==> How to contact "Liu Die Yu" [Employment] I would like to work professionally as a security researcher/bug finder. See my resume at my site. I am very eager to work, flexible, and extremely productive. I have a top notch resume, with credentials from leading bug finders. I am willing to work per contract, relocate, or telecommute. [Give a Hand] I haven't got a job as a security researcher yet and my family don't support my security work - so, I don't have a computer of my own. Please consider about donating at: http://clik.to/donatepc Note for "Invalid ContentType may disclose cache directory" This vulnerability("Invalid ContentType may disclose cache directory") doesn't work on all systems. ("Invalid ContentType may disclose cache directory", at http://www.safecenter.net/UMBRELLAWEBV4/threadid10008/) Please note that execdror6 and LocalZoneInCache also depends on this vulnerability. (execdror6: http://www.safecenter.net/UMBRELLAWEBV4/execdror6/ LocalZoneInCache: http://www.safecenter.net/UMBRELLAWEBV4/LocalZoneInCache/) I have spent extra-ordinary time on this issue and here is all i know about it: First, The code was verified to work on a WinXp system(Simplified Chinese version) with all patches. Then, I sent LocalZoneInCache to HTTP-EQUIV, Dror Shalev and the Pull for testing: It works on Dror Shalev's WinXp machine(up-to-date) but it doesn't work on the Pull's Win2k system. (because he set killbit for Adodb.Stream activeX object.) Soon after that, HTTP-EQUIV found it does not work on his WinXp system(2-3 weeks old, with the latest IE patch). Then, to figure out what happened, i formatted disk and installed Win2k3 and WinXp(both Simplified Chinese version) and then applied the latest IE patch. Both remote compromise cases(LocalZoneInCache and execdror6) don't work any more. At last, i reproduced both remote compromise cases on MSIEv6 running on Simplified Chinese WinXp with the following patches: SP1;Q828750;Q330994;Q824145(a.k.a MS03-048) If you are using IE, please help me test it and send the result directly to my emailbox. Thanx in advance.