header-logo
Suggest Exploit
vendor:
Internet Explorer, Outlook 98
by:
SecurityFocus
N/A
CVSS
N/A
Redirect Vulnerability
None
CWE
Product Name: Internet Explorer, Outlook 98
Affected Version From: 4
Affected Version To: 5
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 95, Windows 98, Windows NT 3, Windows NT 4
1998

Microsoft Internet Explorer 4.0 for Windows 95/Windows NT 3/Windows NT 4,Internet Explorer 5.0 for Windows 95/Windows 98/Windows NT 4,Outlook 98 0 window.open Redirect Vulnerability

If window.open is called with a target URL that redirects to a client-side file and then a variable is created pointing to the contents of the new window, the contents of the new window (the local file) can be read and possibly manipulated or transmitted by other code in the webpage. The filename and location would have to be known by the attacker, and it could only be a file that is viewable by a browser.

Mitigation:

Ensure that window.open is not used with a target URL that redirects to a client-side file.
Source

Exploit-DB raw data:

Microsoft Internet Explorer 4.0 for Windows 95/Windows NT 3/Windows NT 4,Internet Explorer 5.0 for Windows 95/Windows 98/Windows NT 4,Outlook 98 0 window.open Redirect Vulnerability

source: https://www.securityfocus.com/bid/766/info

If window.open is called with a target URL that redirects to a client-side file and then a variable is created pointing to the contents of the new window, the contents of the new window (the local file) can be read and possibly manipulated or transmitted by other code in the webpage.

The filename and location would have to be known by the attacker, and it could only be a file that is viewable by a browser. 

The exploit code is:
a=window.open(some URL that redirects to the local file);
b=a.document;