Microsoft Internet Explorer permits to examine the existence of local files Description: There is a security bug in Microsoft Internet Explorer, which allows to check up existence of local files in system directories (Root (C:/), WINDOWS, SYSTEM, SYSTEM32, DESKTOP, COMMAND, Internet Explorer). Successful exploitation allows the author of a malicious web site to plan attacks against the target computer. The bug occurs, because Microsoft Internet Explorer does not open a window, if the target file exists; but it will open a window, if the file does not exist. Also an attacker can use this "feature" to verify existence of local files (e.g. system files, malware files, shortcuts on Desktop, ...). Affected software: Microsoft Internet Explorer Workaround: Deactivate "Active Scripting" in the IE options menu. Proof-of-Concept exploit:
Date of discovery: 06. November 2004 Tested in Microsoft Internet Explorer 6 SP1 (6.0.2800.1106) with all patches installed on Windows 98. My DLL versions: MSHTML.DLL: 6.00.2800.1477 BROWSEUI.DLL: 6.00.2800.1596 (xpsp2.040919-1003) SHDOCVW.DLL: 6.00.2800.1596 (xpsp2.040919-1003) SHLWAPI.DLL: 6.00.2800.1584 (xpsp2.040720-1705) URLMON.DLL: 6.00.2800.1475 WININET.DLL: 6.00.2800.1475 Regards, Benjamin Tobias Franz Germany