Vulnerability Note VU#39965

DHTML Edit Control for IE5 allows local files to be uploaded to web server

Original Release date: 01 Oct 2002 | Last revised: 16 Oct 2002

Overview

A vulnerability exists in the DHTML Edit Control for IE5 that allows arbitrary local files to be uploaded to a web server.

Description

DHTML Edit is an activex control that is marked safe-for-scripting. This control can be embedded in a website, and permit local files to be remotely uploaded to the malicious server, if the file location is known. The ClassID of the vulnerable dhtmled.ocx activex control is {2D360201-FFF5-11D1-8D03-00A0C959BC0A}.

According to the Microsoft Security Bulletin:

    - Microsoft Internet Explorer 5 on Windows 95, Windows 98, and Windows NT 4.0 are affected.
    - Microsoft Internet Explorer 5 on other platforms is not affected.
    - Microsoft Internet Explorer 4.0 on Windows 95, Windows 98 and the x86 version of Windows NT 4.0 are affected.
    - Microsoft Internet Explorer 4.0 on other platforms, including the Alpha version of Windows NT 4.0, is not affected.

Impact

Attacker can upload files with known names from the local hard drive to the server, and can read information that user supplies to the control.

Solution

Apply the patch from Microsoft's Security Bulletin MS99-011. The patch changes control to restrict actions based on the domain.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-30 Sep 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported to Microsoft by Juan Carlos Cuartango of Spain.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CVE-1999-0487
  • Date Public: 21 Apr 99
  • Date First Published: 01 Oct 2002
  • Date Last Updated: 16 Oct 2002
  • Severity Metric: 1.98
  • Document Revision: 13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.