Full Disclosure mailing list archives
RE: Re: shell:windows
From: "Larry Seltzer" <larry () larryseltzer com>
Date: Mon, 12 Jul 2004 11:55:08 -0400
The shell:windows code does work in IE, the only difference being that it displays a
dialogue box when referenced asking if the user wishes to open or save the file. Combine that with a little social engineering and you've got a potential compromise. This behavior is indistinguishable from that of a simple href to the file itself, so there's no point in bringing in the shell: stuff. If you want to assume a little social engineering can do anything than a simple href is a vulnerability for any browser.
Also, when the shell:windows reference is input into IE's address bar field, it
executes the code without a a dialogue box... Gimme a break. This is not a meaningful problem. Larry Seltzer eWEEK.com Security Center Editor http://security.eweek.com/ http://blog.ziffdavis.com/seltzer larryseltzer () ziffdavis com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: shell:windows Nick Eoannidis (Jul 10)
- Re: Re: shell:windows Barry Fitzgerald (Jul 12)
- RE: Re: shell:windows Larry Seltzer (Jul 12)
- <Possible follow-ups>
- Re: Re: shell:windows Barry Fitzgerald (Jul 12)
- RE: Re: shell:windows Larry Seltzer (Jul 12)
- Re: Re: shell:windows Barry Fitzgerald (Jul 12)
- Re: Re: shell:windows Nick FitzGerald (Jul 12)
- RE: Re: shell:windows Perrymon, Josh L. (Jul 12)
- Re: Re: shell:windows Barry Fitzgerald (Jul 12)