header-logo
Suggest Exploit
vendor:
Internet Explorer
by:
SecurityFocus
7.5
CVSS
HIGH
File URL Execution
94
CWE
Product Name: Internet Explorer
Affected Version From: Internet Explorer 5.1
Affected Version To: Internet Explorer 5.1
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:internet_explorer
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: MacOS 8 and 9
2002

MacOS File URL Execution Vulnerability

A vulnerability has been discovered in MacOS systems running Internet Explorer 5.1 and earlier. File URLs may be used by a malicious webmaster to execute programs on a web user's local system. The exact path to the location of the file must be known. This includes being able to anticipate the name of a particular user's hard drive. This issue may be exploited to execute 'Speakable Items' in MacOS 8 and 9. This issue may also be exploitable through maliciously crafted HTML-enabled e-mail.

Mitigation:

Users should avoid visiting untrusted websites and should not open HTML-enabled e-mails from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/3935/info

A vulnerability has been discovered in MacOS systems running Internet Explorer 5.1 and earlier. MacOS X is not affected by this issue.

File URLs may be used by a malicious webmaster to execute programs on a web user's local system. The exact path to the location of the file must be known. This includes being able to anticipate the name of a particular user's hard drive.

This issue may be exploited to execute "Speakable Items" in MacOS 8 and 9.

This issue may also be exploitable through maliciously crafted HTML-enabled e-mail. 

<META HTTP-EQUIV="refresh" CONTENT="1; URL=file:///Macintosh%20HD/System%20Folder/Speakable%20Items/Put%20Computer%20To%20Sleep">