Lucene search

K
exploitdbGeorgi GuninskiEDB-ID:21195
HistoryJan 01, 2002 - 12:00 a.m.

Microsoft Internet Explorer 5/6 - GetObject File Disclosure

2002-01-0100:00:00
Georgi Guninski
www.exploit-db.com
24

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/3767/info

A flaw exists in Microsoft Internet Explorer that may allow a remote attacker to view known files on a target system when a user views web content containing a specially crafted script.

The problem occurs when the 'GetObject()' JScript function is used with the ActiveX object 'htmlfile.' If a URL containing "../" sequences is passed as the first argument to the function, it is possible to cause Internet Explorer to grant full access to the DOM of the created HTML document object:

a=GetObject("http://"+location.host+"/../../../../../../test.txt","htmlfile");

This vulnerability could be used by a malicious web site administrator to view any known file on a target system. It may also lead to the execution of arbitrary code. 

AI Score

7.4

Confidence

Low

Related for EDB-ID:21195