Users login

Create an account »


Users login

Home » Hacking News » IE allows universal Cross Site Scripting

IE allows universal Cross Site Scripting

by Nikola Strahija on April 21st, 2002 Affected applications: ---------------------- Any application that hosts the WebBrowser control (IE6+). Some of these are: Microsoft Internet Explorer Microsoft Outlook Microsoft Outlook Express


Elevating privileges, hijacking the MSN Messenger client, running script in
the My Computer zone, arbitrary command execution, etc.


Among its extensive functionality, IE employs a set of useful methods to
display dialog windows. These, the showModalDialog and showModelessDialog
methods, can transfer objects from the originating page to the page being
displayed inside the dialog, by use of the dialogArguments property.


The dialogArguments property tries to prevent interaction between remote
pages by comparing the location of the originating page and the dialog page.

When opening a dialog window (e.g. res://shdoclc.dll/policyerror.htm) from
another protocol, port or domain (e.g., the validation
code in IE will ensure that no objects are transferred, and no interaction
is as such possible.
When both pages are on the same protocol, port and domain, the validation
code will allow interaction.
Unfortunately, the validation code only checks the original URL instead of
the final URL, and it is as such possible to bounce a HTTP redirect from the
originating site to the desired dialog page that will allow interaction.

It is worth noting that this is not in any way limited to the RES://
protocol. The flawed dialogArguments property also allows interaction
between different domains (e.g. YAHOO.COM to MICROSOFT.COM), different
protocols (HTTP to HTTPS, HTTP to FILE, etc.) and different ports (port 80
to port 21, port 80 to port 25, etc.)

For the sake of demonstration, we take a look at shdoclc.dll which contains
several resource in the HTML category, labeled POLICYERROR.HTM,
contain the following script code:

var site = window.parent.dialogArguments.url;

function printSite()
document.write( site);


var sCode = 'alert("This is running from: " +
window.showModalDialog("redirect.asp", {url:sCode})

Redirect.asp contains:

Solution: (for MS)

Fix the faulty validation routine in dialogArguments.
Include input validation in resource files.
Also, fixing the incomplete MS02-015 patch will ensure that this specific
command execution vulnerability will not reoccur when the next CSS issue is

Solution: (for users)

Disable scripting.

Tested on:

IE6sp1 Win2000 SP2, with all patches.
IE6sp1 Windows 98, with all patches.
IE6sp1 Windows 98 SE, with all patches.


-Put together some proof-of-concept examples:
- Simple static examples: Demonstratory fixed code
- Advanced example: Input arbitrary script code
- Hijacking MSN Messenger: An updated version of a previous bulletin
- Executing arbitrary commands: How CodeBase was not fixed

These can be found at

Vendor status:

Microsoft was notified 18 March 2002 and were able to reproduce the issue
They are currently (16 April 2002) investigating whether to address this in
an upcoming cumulative patch.

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »