Forum Moderators: open

Message Too Old, No Replies

Internet Explorer Back Button Security Hole

Microsoft did it again!

         

scotty

7:03 am on Apr 17, 2002 (gmt 0)

10+ Year Member



[online.securityfocus.com ]

Saw it on the Slashdot. Basicaly when you press the back button in IE, the page you go back to will have the same security zone previledge as the last page you visited. Therefore, a web page that contains malicious Javascript can send the user to a local zone. If the user click on the back button to go back to the previous page, malicious Javascript will gain the local zone previledge. That means, executing local files, reading local files or resources, etc.

Anyone else still using IE here? :(

korkus2000

2:47 pm on Apr 17, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I have checked it out on my computer and it works. MS needs a patch asap.

EliteWeb

3:55 pm on Apr 17, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



That's a sexy hole (: I'll have to deploy some malicious java script on a page I have and take over peoples drives and blame it on MS! heheh anyways, Mac users just found out that all of the Mac software from Microsoft has a critical security issue in it.

scotty

9:01 pm on Apr 17, 2002 (gmt 0)

10+ Year Member



Referring to a previous thread [webmasterworld.com], now web sites really have a valid reason to disable the back button :)

mivox

10:11 pm on Apr 17, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



all of the Mac software from Microsoft has a critical security issue in it

Two words: 1.Opera 2.Eudora

(I only use Word and PowerPoint because my boss makes me do it.)

tedster

10:48 am on May 7, 2002 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Wired coverage of the IE Back Button security hole [wired.com]

A Microsoft spokesman said the Microsoft Security Response Center thoroughly investigated Sandblad's report "and determined that because the proposed exploit scenario is dependent upon specific user interaction as a prerequisite, it does not meet our definition [microsoft.com] of a security vulnerability."

Right. As if clicking the back button was an uncommon user interaction!

Useful comment, later in the article:

Programmer Mikal Zabor also suggested that Windows users, those who "must run Explorer," should consider installing the Windows operating system anywhere but their main (C) drive.

"Many exploits assume ... you're running Microsoft products, and they assume your system is on the C drive with the default install. If you move the system off the main drive, or set up partitions, you make it harder for malicious hackers."