search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Office Web Components allows reading of local files via "LoadText" method by using URL redirection

Vulnerability Note VU#355707

Original Release Date: 2002-08-26 | Last Revised: 2002-08-26


The Microsoft Office Web Components allow a remote attacker to read arbitrary files.


The Microsoft Office Web Components (OWC) are ActiveX controls that can be embedded in web pages. These controls give users of a website limited Microsoft Office functionality, without having to have the entire Office suite installed on their machine.

One of the controls allows a web page to load text into the window of a web browser. A flaw in this control allows a remote attacker to read arbitrary files on the vulnerable system. Note that in order to successfully exploit this vulnerability, the attacker would have to know the name and path to the file they wish to read.

For more information, please see Microsoft Security Bulletin MS02-044.


An remote attacker can read arbitrary files on the vulnerable system.


Apply a vendor supplied patch.

Vendor Information


Microsoft Corporation Affected

Updated:  August 26, 2002



Vendor Statement

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to GreyMagic Software for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-0860
Severity Metric: 30.86
Date Public: 2002-08-21
Date First Published: 2002-08-26
Date Last Updated: 2002-08-26 17:05 UTC
Document Revision: 26

Sponsored by CISA.