Microsoft Windows Media Player Javascript URL Vulnerability
BID:2167
Info
Microsoft Windows Media Player Javascript URL Vulnerability
| Bugtraq ID: | 2167 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Jan 01 2001 12:00AM |
| Updated: | Jan 01 2001 12:00AM |
| Credit: | Discovered and posted to Bugtraq on Jan 1, 2001 by Georgi Guninski <[email protected]>. |
| Vulnerable: |
Microsoft Windows Media Player 7.0 |
| Not Vulnerable: | |
Discussion
Microsoft Windows Media Player Javascript URL Vulnerability
Windows Media Player is an application used for digital audio, and video content viewing. It can be embedded in webpages as an ActiveX control.
It is possible to execute a javascript URL from within the Windows Media Player ActiveX control embedded in HTML. This javascript can be executed in arbitrary "already open" frames, specified within the ActiveX control. By doing this, an attacker can take over the frame's DOM (document object model), bypassing security restrictions. This would be accomplished through a special webpage and having the victim visit the webpage.
An attacker exploiting this vulnerability can read files on the users filesystem and reportedly execute arbitrary programs on the victim host.
Windows Media Player is an application used for digital audio, and video content viewing. It can be embedded in webpages as an ActiveX control.
It is possible to execute a javascript URL from within the Windows Media Player ActiveX control embedded in HTML. This javascript can be executed in arbitrary "already open" frames, specified within the ActiveX control. By doing this, an attacker can take over the frame's DOM (document object model), bypassing security restrictions. This would be accomplished through a special webpage and having the victim visit the webpage.
An attacker exploiting this vulnerability can read files on the users filesystem and reportedly execute arbitrary programs on the victim host.
Exploit / POC
Microsoft Windows Media Player Javascript URL Vulnerability
The following exploit has been provided by Georgi Guninski <[email protected]>:
http://www.guninski.com/wmp7ie.html
The following exploit has been provided by Georgi Guninski <[email protected]>:
http://www.guninski.com/wmp7ie.html
Solution / Fix
Microsoft Windows Media Player Javascript URL Vulnerability
References
Microsoft Windows Media Player Javascript URL Vulnerability
References:
References:
- Windows Media Player Homepage (Microsoft)