www.microsoft.com/technet/security/advisory/2501696.mspx There appears to be a myriad of ways it can be leveraged and a lot of thought and creativity is being poured into that. So now would be a good time to: test and consider the registry workaround (see advisory); to review group policies for zone settings for Internet Explorer; and to review detection options for email gateways and proxies/NIDS/etc. |
Robert 49 Posts Jan 28th 2011 |
Thread locked Subscribe |
Jan 28th 2011 1 decade ago |
After a careful reading of the advisory, I don't see what the vulnerability really is.
It requires a request to a web server with the MHTML segment in it. Then the script can do anything that a normal script in a normal web page can do "spoof content, disclose information, or take any action that the user could take". In a normal web page this is usually called AJAX (or DOM) scripting. Is it a problem because MHTML is not supposed to allow this? Or is it a problem because the attacker can use a non-standard way to put the script into the MHTML page possibly bypassing any signature based checks in AV software? |
Nathan Christiansen 20 Posts |
Quote |
Jan 28th 2011 1 decade ago |
Now I see the problem. "It is possible for this vulnerability to allow an attacker to run script in the wrong security context."
Meaning it could possibly do non-blind cross-site request forgery, and bypass checks for cross site scripting. |
Nathan Christiansen 20 Posts |
Quote |
Jan 28th 2011 1 decade ago |
They've chucked out a temporary workaround auto "fixit" thing as well:
http://support.microsoft.com/kb/2501696 |
Alex 19 Posts |
Quote |
Jan 28th 2011 1 decade ago |
The handler also ignores files extensions. So mhtml files can be placed on sites as jpg or whatever. So easy to hide.
Some exploit code is about now. M |
Mark 391 Posts ISC Handler |
Quote |
Jan 29th 2011 1 decade ago |
- http://secunia.com/advisories/43093/
Release Date: 2011-01-29 Impact: Cross Site Scripting Where: From remote ... Solution: Enable MHTML protocol lockdown (either manually or using the available automated "Microsoft Fix it" solution). > http://support.microsoft.com/kb/2501696#FixItForMe . |
Jack 160 Posts |
Quote |
Jan 29th 2011 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!