<<< Date Index >>>     <<< Thread Index >>>

RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability



 

> -----Original Message-----
> From: Polazzo Justin [mailto:Justin.Polazzo@xxxxxxxxxxxxxxxxxxxxx] 
> Sent: Monday, July 12, 2004 12:22 PM
> To: Drew Copley
> Cc: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: RE: MSIE Download Window Filename + Filetype 
> Spoofing Vulnerability
> 
> Should you not be able to tile your gui any way you please? 

You can title your UI anyway you please.

> 
> Someone may be thinking that you could put an image in front 
> of the security box in order to trick users into clicking on 
> "open" without knowledge. I noticed that you cant click on 
> the buttons when the image is in front of them.
> 

I haven't checked out the new demo, but it is inconsquential,
you can totally change the contents of the window so that "No"
becomes "yes", or "yes" becomes "no", or whatever else. [By
stating, "Do Not Run This App", for instance, turns the positive
into the negative.]

"Close this window"?

"Yes".

Boom.

There are countless variations on this as you can put in there,
around there, all around anything you want.

It is a pain to make a really good demo, though, this is
why no one has probably messed with it. And, it is likely
too old for the current wave of criminals to get a handle
on it.

Well, not anymore. But, thankfully, Microsoft fixed this in
SP 2. Hopefully everyone else will get this fix in their
IE as well.


> Would you be able to have an insane speed at which the object 
> moves over the buttons, or a  pulse action to where the image 
> would appear to be solid, but would still select "open" when pressed?

Yeah, you can probably flicker it and hide it as well.

Really, the exploitation is for an artist...

> 
> jp
> 
> -----Original Message-----
> From: Drew Copley [mailto:dcopley@xxxxxxxx]
>