实验六:与其它漏洞结合,修改系统设置,查看系统文件,执行系统命令等 由于与浏览器相关的漏洞太多了,所以可与跨站脚本执行漏洞一起结合的漏洞也就显得不少。我想这 些问题大家都应该很清楚吧,前些时间的修改IE标题漏洞,错误MIME类型执行命令漏洞,还有多种多样 的蠕虫,都是很好的例子。 更多的例子请参考下列链接: Internet Explorer Pop-Up OBJECT Tag Bug http://archives.neohapsis.com/archives/bugtraq/2002-01/0167.html Internet Explorer Javascript Modeless Popup Local Denial of Service Vulnerability http://archives.neohapsis.com/archives/bugtraq/2002-01/0058.html MSIE6 can read local files http://www.xs4all.nl/~jkuperus/bug.htm MSIE may download and run progams automatically http://archives.neohapsis.com/archives/bugtraq/2001-12/0143.html File extensions spoofable in MSIE download dialog http://archives.neohapsis.com/archives/bugtraq/2001-11/0203.html the other IE cookie stealing bug (MS01-055) http://archives.neohapsis.com/archives/bugtraq/2001-11/0106.html Microsoft Security Bulletin MS01-055 http://archives.neohapsis.com/archives/bugtraq/2001-11/0048.html Serious security Flaw in Microsoft Internet Explorer - Zone Spoofing http://archives.neohapsis.com/archives/bugtraq/2001-10/0075.html Incorrect MIME Header Can Cause IE to Execute E-mail Attachment http://www.kriptopolis.com/cua/eml.html