Bugtraq mailing list archives

Re: Internet Explorer 5.0 HTML Applications


From: steve.posick () ESPN COM (Posick, Steve)
Date: Wed, 18 Aug 1999 12:22:17 -0400


In response to Bryan's article about the possible dangers of HTML
applications me and a colleague (Jesse Raccio) worked up a demonstration for
our security personal to demonstrate the possible threat.  The HTA we
developed displays a pop up frame that contains some trivial text and a
VBScript that will download an executable from a specified web site and
place it into the Win98 startup group as well as upload any .PWL files that
exist in the Windows Root directory.

Here's How it works.
This application works by using the IE 5 and FileSystemObject Active X
controls and some very simple scripting.
The first thing the HTA does is use IE to view an exe file (renamed to a txt
extension) on the remote web server.  This places the exe into IE's cache
for later retrieval.  We had to do this because Micro$oft has apparently
gone through (not so) great lengths to prevent the writing of binary files
through HTA's.  We then use the FileSystemObject to move and rename our
cached exe to a more suitable location (In this case that startup
directory).  This same technique can be used to trojan any file the current
user has access too.  We have no reason not to believe that this will also
work on NT.  (We have a demo we just can't test it at the moment)

Solution
Disable File Downloads or disassociate .HTA files from MSHTA.exe.  Disabling
scripting does not stop this, we believe it is dew to the fact that the HTA
is already on the local system at the time of execution, thus making it
trusted.


Current thread: