Vulnerability Note VU#711843

Microsoft Internet Explorer contains cross-site scripting vulnerabilities in local HTML resources

Original Release date: 16 Sep 2002 | Last revised: 05 Jun 2007


Microsoft Internet Explorer (IE) includes several local HTML resources that contain cross-site scripting vulnerabilities. These resources use the dialogArguments property of dialog frames insecurely, allowing an attacker to execute arbitrary script in the Local Machine Zone.


Microsoft Internet Explorer (IE) includes local HTML code that is used by the browser. These code resources can be accessed from IE using the "res://" protocol. A number of these resources use the dialogArguments property of modal dialog frames insecurely, accepting script from untrusted HTML documents such as Internet web pages and email messages. Due to a separate vulnerability in the way dialog methods validate the source of dialog frames (VU#728563), script injected into these local resources via dialogArguments is executed in the Local Machine Zone.

In VU#728563, IE fails to correctly identify the source of modal dialog frames opened with the Redirect method or IFRAME elements. In VU#711843, local HTML resources accept script from modal dialog frames via the dialogArguments property. As a result, script from an attacker's web page can be injected into local HTML resources and the script will execute in the Local Machine Zone.

The following local HTML resources in IE 6.0 are vulnerable:

MS02-023 (Q321232) prevents attacks that use the Redirect method against these resources in IE 6.0.

This local HTML resource in IE 5.01, 5.5, and 6.0 is vulnerable:
MS02-047 (Q323759) prevents attacks that use the Redirect method against this resource in IE 5.01 and 5.5. MS02-023 does the same for IE 6.0.

MS03-004 (Q810847) includes the functionality of the MS02-023 and MS02-047 patches and prevents attacks that use IFRAME elements against all of the local HTML resources listed above. IE 5.01 is not vulnerable.

Internet Explorer, Outlook, Outlook Express, Eudora, Lotus Notes, AOL, and any other applications that host the WebBrowser control are affected.

Further information is available in advisories by Thor Larholm (TL#002), GreyMagic Software (GM#001-AX), and Liu Die Yu (BadParent).


An attacker who is able to convince a user to access a specially crafted HTML document, such as an Internet web page or HTML email message, could execute arbitrary script with privileges of the user in the security context of the Local Machine Zone. This technique could be used to read certain types of files in known locations on the user's system. In conjunction with other vulnerabilities (VU#626395, VU#25249), the attacker could execute arbitrary commands on the user's system.


Apply Patch
Apply 810847 or a more recent cumulative patch. See Microsoft Security Bulletin MS03-004 for more information.

Disable Active scripting

Active scripting is required to open a modal dialog frame and populate dialogArguments, which is a proven and well-publicized method of attack. At a minimum, disable Active scripting in the Internet zone and the zone used by Outlook, Outlook Express, or any other email client that uses Internet Explorer or the WebBrowser control to render HTML. Instructions for disabling Active scripting can be found in the CERT/CC Malicious Web Scripts FAQ.

Apply the Outlook Email Security Update

Another way to effectively disable Active scripting in Outlook is to install the Outlook Email Security Update. The update configures Outlook to open email messages in the Restricted Sites Zone, where Active scripting is disabled by default. In addition, the update provides further protection against malicious code that attempts to propagate via Outlook. The Outlook Email Security Update is available for Outlook 98 and Outlook 2000. The functionality of the Outlook Email Security Update is included in Outlook 2002 and Outlook Express 6.

Update HTML Help

To protect against arbitrary command execution, install an updated version of HTML Help (811630). As described in Microsoft Security Bulletin MS03-015, the updated HHCtrl ActiveX control disables the Shortcut command in a compiled help file that has been opened with the showHelp method:

  • Only supported protocols [http:, https:, file:, ftp:, ms-its:, or mk:@MSITStore:] can be used with showHelp to open a web page or help (chm) file.
  • The shortcut function supported by HTML Help will be disabled when the help file is opened with showHelp This will not affect the shortcut functionality if the same CHM file is opened by the user manually by double-clicking on the help file, or by through an application on the local system using the HTMLHELP( ) API.
Note that the patches referenced in MS03-004 and MS03-015 completely disable the showHelp method. After installing either one of these patches, Internet Explorer will not be able to open help files.

Restrict HTML Help commands

Restrict the execution of the Shortcut and WinHelp HTML Help commands to specified folders, or disable the commands entirely. As in the previous recommendation, this technique will protect against arbitrary command execution via HTML Help. Details are available in Microsoft Knowledge Base Article 810687.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected03 Jun 200214 Mar 2003
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was publicly reported by Thor Larholm.

This document was written by Art Manion and Shawn Van Ittersum.

Other Information

  • CVE IDs: CVE-2002-0189
  • Date Public: 17 Apr 2002
  • Date First Published: 16 Sep 2002
  • Date Last Updated: 05 Jun 2007
  • Severity Metric: 17.40
  • Document Revision: 47


If you have feedback, comments, or additional information about this vulnerability, please send us email.