header-logo
Suggest Exploit
vendor:
Internet Explorer
by:
Georgi Guninski
7.5
CVSS
HIGH
Cross-frame security bypass
352
CWE
Product Name: Internet Explorer
Affected Version From: Internet Explorer 4.x
Affected Version To: Internet Explorer 4.x and Internet Explorer 5.5
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
1999

Vulnerability in Internet Explorer 4.x and 5.5

Internet Explorer 4.x's implementation of Cross-frame security can be bypassed by appending '%01' to an arbitrary URL. This allows for the execution of arbitrary code on the target host, leading to access to local files, window spoofing, and arbitrary code execution. A variation of this vulnerability also exists in Microsoft Internet Explorer 5.5, where the ASCII equivalents of '^A' or '&#01' can be used instead.

Mitigation:

Upgrade to a newer version of Internet Explorer or use an alternative web browser.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/197/info

On January 28, 1999, Georgi Guninski originally reported a vulnerability in Internet Explorer 4.x. Internet Explorer 4.x's implentation of Cross-frame security could be bypassed if "%01" is appended to an arbitrary URL. If the specially malformed URL is inserted in a javascript after an 'about:' statement, arbitrary code can be executed on the target host. Successful exploitation could lead to access to local files, window spoofing, and arbitrary code execution.

On October 6, 2000, Alp Sinan discovered that a variation of this vulnerability exists in Microsoft Internet Explorer 5.5. Instead of using "%01", the ASCII equivalents of "^A" or "&#01" can be used instead. 

Georgi Guninski <guninski@guninski.com> has set up the following demonstration pages:

Exploit through HTML mail message:

http://www.guninski.com/scriptlet.html

http://www.guninski.com/scrspoof.html

Exploit through TDC:

http://www.guninski.com/scrauto.html

Alp Sinan <alp@uk2.net> has set up the following demonstration pages:

Reading of local files:
http://horoznet.com/AlpSinan/localread.htm

Window spoofing:
http://horoznet.com/AlpSinan/webspoof.htm

Cross-frame security circumvention
http://horoznet.com/AlpSinan/crossframe.htm 
cqrsecured