Overview
Microsoft Internet Explorer does not adequately validate references to cached objects and methods across domains and security zones. The impact is similar to that of a cross-site scripting vulnerability, allowing an attacker to access data in other sites, including the Local Computer zone.
Description
Microsoft Internet Explorer features the ability to process scripts contained in HTML documents. This feature is known as Active scripting, and Internet Explorer supports several scripting languages, including VBScript and JScript. JScript is similar to Netscape's JavaScript and both languages played some part in the development of ECMAScript (ECMA-262). For security reasons, a script loaded from one site should not be able to access resources on another site, including the local client. In JavaScript, the Same Origin Policy protects clients by ensuring that "when loading a document from one origin, a script loaded from a different origin cannot get or set specific properties of specific browser and HTML objects in a window or frame." Internet Explorer implements a similar policy, adding the restriction that scripts are not allowed to access properties or objects across security zones. As reported by GreyMagic Software and Liu Die Yu, Internet Explorer does not adequately validate references to certain cached objects and methods across different domains and security zones. A script from a potentially malicious site executing in one domain and security zone is able to access resources in another domain and zone, including the Local Computer zone, via the DHTML Document Object Model interface. |
Impact
By convincing a user to follow a URL or read an HTML email message containing malicious script, and attacker could take any action with the privileges of the user executing the script. This could include opening new browser windows to different sites in different security zones, reading or modifying information in open browser windows, reading files on the local file system, and executing commands that are in a location known to the attacker. An attacker who is able to obtain cookies used for authentication may be able to impersonate a legitimate user and obtain sensitive data such as passwords or credit card information. By leveraging features of the Microsoft HTML Help system (VU#25249), an attacker could execute commands with parameters or cause arbitrary files to be downloaded to a known location on the local system, subject to the user's privileges. |
Solution
|
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://security.greymagic.com/adv/gm012-ie/
- http://www.microsoft.com/technet/security/bulletin/MS02-066.asp
- http://www.microsoft.com/technet/security/bulletin/MS02-068.asp
- http://support.microsoft.com/?kbid=810687
- http://www.securityfocus.com/bid/6028
- http://www.iss.net/security_center/static/10433.php
- http://developer.netscape.com/docs/manuals/js/client/jsguide/sec.htm#1015705
- http://msdn.microsoft.com/workshop/author/om/xframe_scripting_security.asp
- http://www.w3.org/DOM/
- http://support.microsoft.com/default.aspx?scid=KB;en-us;q811630
- http://msdn.microsoft.com/workshop/author/om/doc_object.asp
- http://liudieyuinchina.vip.sina.com/SaveRef/SaveRef-Content.txt
- http://liudieyuinchina.vip.sina.com/SaveRef/SaveRef-MyPage.HTM
- http://liudieyuinchina.vip.sina.com/SaveRef/SaveRef-MyPage-2.HTM
- http://liudieyuinchina.vip.sina.com/SaveRef_DocumentWrite/SaveRef_DocumentWrite-Content.txt
- http://liudieyuinchina.vip.sina.com/SaveRef_DocumentWrite/SaveRef_DocumentWrite-MyPage.htm
- http://jscript.dk/2002/10/sec/SaveRefLocalFile.html
Acknowledgements
GreyMagic Software and Liu Die Yu publicly reported multiple instances of this vulnerability.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2002-1262 |
Severity Metric: | 34.78 |
Date Public: | 2002-10-22 |
Date First Published: | 2002-12-12 |
Date Last Updated: | 2004-05-26 06:25 UTC |
Document Revision: | 62 |