Overview
Microsoft Internet Explorer (IE) dynamic HTML (DHTML) mouse events can manipulate windows to copy objects from one domain to another, including the Local Machine Zone. This vulnerability could allow an attacker to write arbitrary files to the local file system.
Description
In IE, certain DHTML events monitor mouse actions and are permitted to call proprietary DHTML methods that manipulate window objects. This technique can be used to create "drag and drop" operations by moving a window under an object that has registered a mouse event. In a publicly available exploit (HijackClick, 2003-09-10), a mouse event calls a script function that invokes methods to move and resize one browser window over another. The background window contains an object (in this case, the user's Favorites directory) instantiated by a reference to a ShellNameSpace ActiveX object. The result is a new bookmark (the address of the foreground window) added to the user's Favorites list (the object in the background window). Other objects expose the local file system in this manner, for example, the user's Startup folder (shell:startup). |
Impact
By convincing a victim to click on a link in an HTML document (web page, HTML email), an attacker could write arbitrary files to a vulnerable system within the security context of the user running IE. These files could contain code that could be executed through other means. MS04-004 elaborates: "Although this code could not be executed through this vulnerability directly, the operating system might open the file if it is dropped to a sensitive location, or a user may click the file inadvertently, causing the attacker's code to be executed." One example of a "sensitive location" is the user's Startup folder (shell:startup). |
Solution
Apply a patch |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.securityfocus.com/archive/1/336992
- http://www.securityfocus.com/archive/1/345626
- http://www.safecenter.net/UMBRELLAWEBV4/HijackClick/HijackClick-Content.HTM
- http://www.safecenter.net/UMBRELLAWEBV4/HijackClickV2/HijackClickV2-Content.htm
- http://freehost07.websamba.com/greyhats/hijackclick3.htm
- http://www.microsoft.com/technet/security/bulletin/MS03-048.asp
- http://www.microsoft.com/technet/security/bulletin/MS04-004.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/dhtml_reference_entry.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/events.asp
- http://support.microsoft.com/?kbid=307594
- http://support.microsoft.com/?kbid=291387
- http://support.microsoft.com/?kbid=831167
- http://support.microsoft.com/?kbid=888534
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/resizeby.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/resizeto.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/moveby.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/moveto.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/show.asp
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1027
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0823
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0841
- http://www.secunia.com/advisories/9711/
- http://www.secunia.com/advisories/10289/
- http://secunia.com/advisories/12048/
- http://www.securityfocus.com/bid/9009
- http://www.securityfocus.com/bid/9108
- http://www.securityfocus.com/bid/10690
- http://xforce.iss.net/xforce/xfdb/13679
- http://xforce.iss.net/xforce/xfdb/13844
- http://xforce.iss.net/xforce/xfdb/16675
Acknowledgements
This vulnerability and the first two attack vectors (HijackClick and HijackClickV2) were publicly reported by Liu Die Yu. The third vector, Hijack Click 3, was publicly reported by Paul. Thanks to Microsoft for information used in this document.
This document was written by Art Manion.
Other Information
CVE IDs: | CVE-2003-0823 |
Severity Metric: | 28.13 |
Date Public: | 2003-09-10 |
Date First Published: | 2004-02-02 |
Date Last Updated: | 2004-10-28 18:37 UTC |
Document Revision: | 86 |