Overview
A vulnerability in the way Microsoft Internet Explorer (IE) handles window ornament parameters in dialog frames allows script from a dialog frame in one domain to execute in a different domain, including the Local Machine Zone. The script could read certain local files and data (i.e. cookies) from other web sites. In the presence of other vulnerabilities (VU#626395, VU#25249), the script could execute arbitrary commands.
Description
Microsoft Internet Explorer provides two methods (showModalDialog and showModelessDialog) that can be used to display dialog box frames. Both methods require a URI parameter that specifies the source of the dialog frame's content. The methods may optionally specify "windows ornaments" that control different aspects of the dialog frame's appearance (position, dimensions, font settings, etc.). A dialog frame is subject to the security restrictions of the DHTML Object Model: script executing in one frame cannot access data in a frame from a different domain or across a different protocol. The dialog methods may specify source URIs in a different domain than the parent frame, however the security restrictions should prevent script in one frame from accessing data in the other. |
Impact
An attacker who is able to convince a user to access a specially crafted HTML document, such as an Internet web page or HTML email message, could read data from a different domain, including the Local Machine Zone. The attacker could read cookies from other web sites and certain types of local files. The attacker's HTML document would need to reside in a zone in which Active scripting was enabled. |
Solution
Apply Patch |
Restrict HTML Help commands Restrict the execution of the Shortcut and WinHelp HTML Help commands to specified folders, or disable the commands entirely. As in the previous recommendation, this technique will protect against arbitrary command execution via HTML Help. Details are available in Microsoft Knowledge Base Article 810687. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://liudieyuinchina.vip.sina.com/PoisonousSTYLEforDialog/PoisonousSTYLEforDialog-Content.txt
- http://liudieyuinchina.vip.sina.com/PoisonousSTYLEforDialog/PoisonousSTYLEforDialog-MyPage.htm
- http://www16.brinkster.com/liudieyu/PoisonousSTYLEforDialog/PoisonousSTYLEforDialog-Content.txt
- http://www16.brinkster.com/liudieyu/PoisonousSTYLEforDialog/PoisonousSTYLEforDialog-MyPage.htm
- http://www.securityfocus.com/archive/1/301945/2002-11-29/2002-12-05/0
- http://jscript.dk/2002/11/sec/diemodalstyleXSS.html
- http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-015.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodaldialog.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodelessdialog.asp
Acknowledgements
This vulnerability was publicly reported by Liu Die Yu.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2003-0116 |
Severity Metric: | 16.73 |
Date Public: | 2002-12-03 |
Date First Published: | 2003-05-05 |
Date Last Updated: | 2003-05-06 20:24 UTC |
Document Revision: | 31 |