Microsoft Internet Explorer 5.5 File Disclosure Vulnerability

ID EDB-ID:20903
Type exploitdb
Reporter Georgi Guninski
Modified 2001-03-31T00:00:00


Microsoft Internet Explorer 5.5 File Disclosure Vulnerability. Remote exploit for windows platform


Internet Explorer contains a flaw which could enable a remote web site operator to retrieve a known file from a visiting user's system.

If a specially formed script containing GetObject function with the known path to an existing file is embedded on a web page. Once the target user opens the web page, IE will return the contents of the file back to the web server.

It may be possible to execute arbitrary commands, although it has not been confirmed. 

Security bug in Internet Explorer - MSScriptControl.ScriptControl
Security bug in Internet Explorer - MSScriptControl.ScriptControl
<p>Legal Notice:
<br>This Advisory and Demonstration is Copyright (c) 2001 Georgi Guninski. You may distribute
it unmodified. You may not modify it and distribute it or distribute parts
of it without the author's written permission.
<br>The opinions expressed in this advisory and program are my own and
not of any company.
<br>The usual standard disclaimer applies, especially the fact that Georgi
<br>is not liable for any damages caused by direct or  indirect use
of the information or functionality provided by this advisory or program.
<br>Georgi Guninski, bears no responsibility for content or misuse of this
advisory or program or any derivatives thereof.
Wait a few seconds.
Read the <A HREF="scractx.html">Advisory</A> for more information.

alert("This script reads C:\\TEST.TXT\nYou may need to create it\n")
v=new ActiveXObject("MSScriptControl.ScriptControl.1");

<center>(C) Copyright 2000 Georgi Guninski</center>
| <a href="">Home</a> | 
<a href="browsers.html">Internet Explorer</a> | 
<a href="win2k.html">Windows 2000</a> | 
<a href="exploit.html">AIX</a> | 
<a href="netscape.html">Netscape</a> | 
<a href="greets.html">Greets</a> | 
<a href="index.html">More...</a> |