實驗六:與其它漏洞結合,修改系統設置,查看系統文件,執行系統命令等 由于與瀏覽器相關的漏洞太多了,所以可與跨站腳本執行漏洞一起結合的漏洞也就顯得不少。我想這 些問題大家都應該很清楚吧,前些時間的修改IE標題漏洞,錯誤MIME類型執行命令漏洞,還有多種多樣 的蠕蟲,都是很好的例子。 更多的例子請參考下列鏈接: Internet Explorer Pop-Up OBJECT Tag Bug http://archives.neohapsis.com/archives/bugtraq/2002-01/0167.html Internet Explorer Javascript Modeless Popup Local Denial of Service Vulnerability http://archives.neohapsis.com/archives/bugtraq/2002-01/0058.html MSIE6 can read local files http://www.xs4all.nl/~jkuperus/bug.htm MSIE may download and run progams automatically http://archives.neohapsis.com/archives/bugtraq/2001-12/0143.html File extensions spoofable in MSIE download dialog http://archives.neohapsis.com/archives/bugtraq/2001-11/0203.html the other IE cookie stealing bug (MS01-055) http://archives.neohapsis.com/archives/bugtraq/2001-11/0106.html Microsoft Security Bulletin MS01-055 http://archives.neohapsis.com/archives/bugtraq/2001-11/0048.html Serious security Flaw in Microsoft Internet Explorer - Zone Spoofing http://archives.neohapsis.com/archives/bugtraq/2001-10/0075.html Incorrect MIME Header Can Cause IE to Execute E-mail Attachment http://www.kriptopolis.com/cua/eml.html