Vulnerability Development mailing list archives
Re: local security workaround through IE
From: javor () MULTIGROUP-BG COM (Javor Ninov)
Date: Wed, 5 Apr 2000 15:09:03 +0300
Another way to get a dos prompt is via OLE objects :-)) Example: Start WordPad , goto menu INSERT , OBJECT, CREATE FROM FILE and type location of program you wish to start ( c:\command.com ) ----- Original Message ----- From: "Blue Boar" <BlueBoar () THIEVCO COM> To: <VULN-DEV () SECURITYFOCUS COM> Sent: Saturday, March 25, 2000 10:02 AM Subject: Re: local security workaround through IE
Knud Erik Højgaard wrote:On many 'crippled' public computers (at libraries etc.) running some
sort
of restriction software, its possible to use file/open/browse in IE,
type
for instance c:\ as filename, and get a directory overview. Nice for determining what kind of security software is running, (by looking in 'program files' *doh daft admins*) deleting files etc. . This is not a
bug
in IE, just bad programming from the software dudes...i guess? Right click the file you want to run, and instead of choosing the top option called 'select', use #2 called 'open' ... sometimes access is disallowed to certain files IE command.com etc. , but simply downloading the file from somewhere else or copying it to another location usually
lets
you run pretty much whatever you want.I've managed to get my prompt back on an NT box I was configuring to be a kiosk via Netscape.. I secured it a bit too much during one round. :) You can reconfigure just about any mime type to execute an external program, say explorer.exe. I had netscape set to be the shell. It's easy to forget that changing everyone to no access overrides admin having any access, since everyone includes admin, and no access overrides any other ACLs. Whoops.I've had loads of fun mass OOB'ing libraries from one of their own machines..yes i know its lame, but i
kind
of like looking at 40 screens turning blue one after another.. comments anyone ?Yes, winnuking is lame. :) That was patched a long time ago... they're still vulnerable? BB
Current thread:
- Re: local security workaround through IE, (continued)
- Re: local security workaround through IE WHiTe VaMPiRe (Mar 31)
- Re: local security workaround through IE Matthew S. Hallacy (Apr 03)
- Re: local security workaround through IE Bluefish (Apr 05)
- Re: local security workaround through IE WHiTe VaMPiRe (Apr 05)
- Re: local security workaround through IE Seth R Arnold (Apr 05)
- Novell 32bit Client , Passwords Michael Sanders (Apr 06)
- Re: Novell 32bit Client , Passwords Seth R Arnold (Apr 06)
- Re: Novell 32bit Client , Passwords Andrew Griffiths (Apr 06)
- Re: local security workaround through IE WHiTe VaMPiRe (Mar 31)
- Re: local security workaround through IE Andrew Bennieston (Apr 08)
- Re: local security workaround through IE Mr Jason C Hill (Apr 06)
- Award BIOS passwords (was Re: local security workaround through IE) Robert A. Seace (Apr 06)
- Re: Award BIOS passwords (was Re: local security workaround through IE) jnzero (Apr 07)
- Kill BIOS dEStr0YEr (Apr 08)
- Re: Kill BIOS Greg Rice (Apr 08)