发布时间 :2002-05-29 00:00:00
修订时间 :2016-10-17 22:16:56

[原文]Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to view arbitrary files that contain the "{" character via script containing the cssText property of the stylesheet object, aka "Local Information Disclosure through HTML Object" vulnerability.

[CNNVD]Microsoft Internet Explorer级联样式表文件泄露漏洞(CNNVD-200205-080)

        Microsoft Internet Explorer 5.01,5.5和6.0版本存在漏洞。远程攻击者借助包含stylesheet对象cssText属性的脚本浏览含有“{”字符的任意文件,也称为“Local Information Disclosure through HTML Object”漏洞。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:6.0Microsoft Internet Explorer 6.0
cpe:/a:microsoft:ie:5.01Microsoft Internet Explorer 5.01
cpe:/a:microsoft:ie:5.5Microsoft ie 5.5
cpe:/a:microsoft:ie:5.5:sp2Microsoft Internet Explorer 5.5 SP2
cpe:/a:microsoft:ie:5.5:sp1Microsoft Internet Explorer 5.5 SP1
cpe:/a:microsoft:ie:5.01:sp2Microsoft Internet Explorer 5.01 SP2
cpe:/a:microsoft:ie:5.01:sp1Microsoft Internet Explorer 5.01 SP1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20020402 Reading portions of local files in IE, depending on structure (GM#004-IE)
(VENDOR_ADVISORY)  XF  ie-css-read-files (8740)
(UNKNOWN)  BID  4411

- 漏洞信息

Microsoft Internet Explorer级联样式表文件泄露漏洞
中危 设计错误
2002-05-29 00:00:00 2005-10-12 00:00:00
        Microsoft Internet Explorer 5.01,5.5和6.0版本存在漏洞。远程攻击者借助包含stylesheet对象cssText属性的脚本浏览含有“{”字符的任意文件,也称为“Local Information Disclosure through HTML Object”漏洞。

- 公告与补丁

        Microsoft has released patches. However, it has been reported that these patches do not address the issue completely and it is still possible to exploit this vulnerability under some circumstances.
        Microsoft Internet Explorer 6 Service Pack 1 is reported to eliminate the possibility that a redirect may be used to exploit this issue.
        Please note that the appropriate service pack must be installed in order to apply the patch:
        Microsoft Internet Explorer 5.0.1 SP2
        Microsoft Internet Explorer 5.5 SP1
        Microsoft Internet Explorer 5.5 SP2
        Microsoft Internet Explorer 6.0

- 漏洞信息 (21361)

Microsoft Internet Explorer 5 Cascading Style Sheet File Disclosure Vulnerability (EDBID:21361)
windows remote
2002-04-02 Verified
0 GreyMagic Software
N/A [点击下载]

The Cascading Style-Sheets (CSS) interpreter for Microsoft Internet Explorer is prone to an issue which may allow an attacker to read the contents of files on a web user's system.

It is possible to use the cssText property of the styleSheet to read portions of files that exist on an arbitrary web user's system. Successful exploitation will cause the CSS interpreter used by Internet Explorer to read portions of text if the targetted file contains a "{" character.

An attacker may exploit this via a malicious webpage to disclose sensitive information contained in (almost) arbitrary files that exist on a web user's system.

Microsoft Security Bulletin MS02-023 includes patches for this vulnerability. There have been reports that the Microsoft patches do not completely address this issue. A HTTP redirect may be used in a malicious webpage to exploit this vulnerability on some patched systems. 

This example attempts to read content from "c:/test.txt":

<link id="oFile" rel="stylesheet" href="file://c:/test.txt" disabled>
<script language="jscript">
onload=function () {
alert(document.styleSheets.oFile.cssText || "Could not extract any text
from file.");

- 漏洞信息

Microsoft IE cssText Arbitrary File Access
Context Dependent Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Microsoft Internet Explorer has a flaw that allows a remote attacker to read files from local or remote locations. The issue is due to a problem in the "cssText" property of the "styleSheet" object. Any file that contains a curly-bracket ("{") will be prased by IE's CSS engine which can then trigger the flaw and allow file reading.

- 时间线

2002-04-02 Unknow
2002-04-02 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete