[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [Full-Disclosure] Re: shell:windows
- To: "'Barry Fitzgerald'" <bkfsec@xxxxxxxxxxxxxxxx>, <nikon@xxxxxxxxxxxxxxxxxxxx>
- Subject: RE: [Full-Disclosure] Re: shell:windows
- From: "Larry Seltzer" <larry@xxxxxxxxxxxxxxxx>
- Date: Mon, 12 Jul 2004 11:55:08 -0400
>>The shell:windows code does work in IE, the only difference being that it
>>displays a
dialogue box when referenced asking if the user wishes to open or save the file.
Combine that with a little social engineering and you've got a potential
compromise.
This behavior is indistinguishable from that of a simple href to the file
itself, so
there's no point in bringing in the shell: stuff. If you want to assume a
little social
engineering can do anything than a simple href is a vulnerability for any
browser.
>>>>Also, when the shell:windows reference is input into IE's address bar
>>>>field, it
executes the code without a a dialogue box...
Gimme a break. This is not a meaningful problem.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.ziffdavis.com/seltzer
larryseltzer@xxxxxxxxxxxxx
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html