Overview
Microsoft Internet Explorer (IE) includes several local HTML resources that contain cross-site scripting vulnerabilities. These resources use the dialogArguments property of dialog frames insecurely, allowing an attacker to execute arbitrary script in the Local Machine Zone.
Description
Microsoft Internet Explorer (IE) includes local HTML code that is used by the browser. These code resources can be accessed from IE using the "res://" protocol. A number of these resources use the dialogArguments property of modal dialog frames insecurely, accepting script from untrusted HTML documents such as Internet web pages and email messages. Due to a separate vulnerability in the way dialog methods validate the source of dialog frames (VU#728563), script injected into these local resources via dialogArguments is executed in the Local Machine Zone. In VU#728563, IE fails to correctly identify the source of modal dialog frames opened with the Redirect method or IFRAME elements. In VU#711843, local HTML resources accept script from modal dialog frames via the dialogArguments property. As a result, script from an attacker's web page can be injected into local HTML resources and the script will execute in the Local Machine Zone. |
Impact
An attacker who is able to convince a user to access a specially crafted HTML document, such as an Internet web page or HTML email message, could execute arbitrary script with privileges of the user in the security context of the Local Machine Zone. This technique could be used to read certain types of files in known locations on the user's system. In conjunction with other vulnerabilities (VU#626395, VU#25249), the attacker could execute arbitrary commands on the user's system. |
Solution
Apply Patch |
Restrict HTML Help commands Restrict the execution of the Shortcut and WinHelp HTML Help commands to specified folders, or disable the commands entirely. As in the previous recommendation, this technique will protect against arbitrary command execution via HTML Help. Details are available in Microsoft Knowledge Base Article 810687. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.pivx.com/larholm/adv/TL002/default.htm
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0189
- http://www.microsoft.com/technet/security/bulletin/MS02-023.asp
- http://online.securityfocus.com/bid/4527
- http://security.greymagic.com/adv/gm001-ax/
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0691
- http://microsoft.com/technet/security/bulletin/MS02-047.asp
- http://online.securityfocus.com/bid/5561
- http://www.iss.net/security_center/static/9938.php
- http://www16.brinkster.com/liudieyu/BadParent/BadParent-CONTENT.txt
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1326
- http://microsoft.com/technet/security/bulletin/MS03-004.asp
- http://www.securityfocus.com/bid/6205
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodaldialog.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/methods/showmodelessdialog.asp
- http://msdn.microsoft.com/workshop/author/om/doc_object.asp
- http://msdn.microsoft.com/workshop/author/om/windows_frames_dialogs.asp
- http://msdn.microsoft.com/workshop/author/om/windows_frames_dialogs.asp#sec_dialogs
- http://msdn.microsoft.com/workshop/author/dhtml/reference/properties/dialogarguments.asp
- http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp#default_zones
- http://support.microsoft.com/support/kb/articles/Q182/5/69.ASP
- http://msdn.microsoft.com/workshop/browser/webbrowser/browser_control_ovw_entry.asp
- http://msdn.microsoft.com/library/default.asp?url=/library/en-us/cpref/html/frlrfsystemwebhttpresponseclassredirecttopic.asp
- http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/iframe.asp
- http://msdn.microsoft.com/workshop/author/om/xframe_scripting_security.asp
- http://msdn.microsoft.com/workshop/author/dhtml/sec_dhtml.asp
Acknowledgements
This vulnerability was publicly reported by Thor Larholm.
This document was written by Art Manion and Shawn Van Ittersum.
Other Information
CVE IDs: | CVE-2002-0189 |
Severity Metric: | 17.40 |
Date Public: | 2002-04-17 |
Date First Published: | 2002-09-16 |
Date Last Updated: | 2007-06-05 13:57 UTC |
Document Revision: | 47 |