Microsoft InternetExplorer 'Folder View for FTP sites' Script Execution Vuln.
IE allows running Malicious Scripts due to a bug in 'folder View for FTP
sites'.
If you enable both an 'Enable folder view for FTP sites' IE Advanced Setting
and an 'Enable Web content in folders' Explorer Folder Option,
the script embedded in FTP Server Address will run.
(Both options are set to 'Enable' by default.)
* It's important that the script runs in the My Computer zone!
+ Details:
~~~~~~~~~~~~~~~~~
The problem is in FTP.HTT invoked by the 'folder view for FTP sites' feature.
( %SystemRoot%WEBFTP.HTT )
- --------------------FTP.HTT--------------------
35:
- -----------------------------------------------
This '%THISDIRPATH%' is not escaped.
(Example 1)
[ ftp://TARGET ]
'%THISDIRPATH%' = 'ftp://TARGET/'
~~~~~~~~~~~~~
(Example 2)
[ ftp://">alert("Exploit"); ]
'%THISDIRPATH%' = 'ftp://">alert("Exploit");/'
alert("Exploit");/">
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Exploit code:
~~~~~~~~~~~~~~~~~
target="_blank">Exploit
+ Demonstration:
~~~~~~~~~~~~~~~~~
http://www.geocities.co.jp/SiliconVa...visory02e.html
+ Workaround:
~~~~~~~~~~~~~~~~~
Disable either 'Enable folder view for FTP sites' IE Advanced Setting
or 'Enable Web content in folders' Explorer Folder Option.
+ Vendor status:
~~~~~~~~~~~~~~~~~
Microsoft was notified on 21 December 2001.
- ----------------------------------------------------------------------
Eiji "James" Yoshida
penetration technique research site
E-mail: zaddik@geocities.co.jp
URL: http://www.geocities.co.jp/SiliconValley/1667/index.htm
- ----------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8ckt
Comment: Eiji James Yoshida
iQA/AwUBPP93/TnqpMRtMot1EQJE+gCg3tezyI7XyhSatXTXkjuwTqkiuroAoOkA
55mgpZ0K8d9mx/c0pS2Knqoe
=PTNT
-----END PGP SIGNATURE-----
Source: http://www.xatrix.org/article1593.html