mailing list archives
XSS in "Spyware installs with no interaction in IE on fully patchedXP SP2 box"
From: jamie fisher <contact_jamie_fisher () yahoo co uk>
Date: Mon, 4 Oct 2004 20:37:13 +0100 (BST)
Above is a measly example of XSS - upload any file you like if you want to the site with XSS; seems to be open to all
sorts - but I just spidered the web app and there appears to be quite a number of scripts that are pushing the
applications down your wire... Not 100% sure but I'd guess that since this is seems to be the sort of site people
would visit to get their windows wares it stands to reason that someone would upload a file like in the example above
in order to do... I haven't had the opportunity to see where the .cab is being pushed from - whether on site or off.
Would it be worth investigating?
Willem Koenings <isec () europe com> wrote:
I was unable to verify it, since I don't use IE, and would prefer not
infecting myself on accident, however I did run across this:
Perhaps one of the themes you downloaded was bundled with the spyware?
two tiny links from there:
btw, old trusty IE 5.01 + manually configured security settings =
no problem at all. either XP+SP2 broke seriously something in IE
or Geraldo Rivera has just poorly configured internet setting.
Sign-up for Ads Free at Mail.com
Full-Disclosure - We believe in it.
ALL-NEW Yahoo! Messenger - all new features - even more fun!