Recently I wrote about cross-browser Code Execution via XSS attack (http://websecurity.com.ua/2638/). Earlier I wrote you about Code Execution via XSS in Internet Explorer (http://securityvulns.ru/Udocument911.html).
In this article I told about Code Execution attack via IE via Cross-Site Scripting vulnerability in Opera (http://websecurity.com.ua/2555/), which I disclosed in October 2008.
The attack works when web page was saved in Opera as Web Archive file with name .htm (.html) at user's computer and then it was opened in IE. This technique can be used for bypassing of different proxies and firewalls, which analyze content of web pages for malicious code (because attacking code appears in the page already after saving). And also can be used for bypassing of antiviruses.
For making of hidden attack the iframe can be used:
<iframe src="http://site/?--%3E%3Cscript%3Ec=new%20ActiveXObject('WScript.Shell');c.Run('calc.exe');%3C/script%3E" height="0" width="0"></iframe>
Unlike previous attack (which occurs only via IE), this cross-browser attack works in IE even without turned on option “Initialize and script ActiveX control not marked as safe”.
Vulnerable is version Opera 9.52 and previous versions (and potentially next versions). Code execution occurs in any version of Internet Explorer (IE6 and IE7).
Similar attack also can be made in browser Google Chrome - via Cross-Site Scripting vulnerability in Google Chrome (http://websecurity.com.ua/2505/). Only in Chrome it's needed to save web page not as Web Archive, but the same as in IE, save as Web Page, complete.
But only in old versions (Chrome <= 0.2.149.30), because in versions starting with Chrome 0.3.154.9 this XSS was fixed already. These XSS vulnerabilities in Opera and Chrome belong to Saved XSS type (http://websecurity.com.ua/2641/).
Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua