Microsoft Edge read:// urlhandler...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

This exploit was reported to Microsoft and I was acknowledged for doing so. The exploit has been patched on March 14th 2017 under names cve-2017-0065 and MS17-007 and will not work if related patches are applied. Sourcecode is provided for educational purposes only. ### General This exploit requires the victim has a forged file (exploit.html) on his file system on a known file location. Victim does not need to run it, just have it. The file can then be invoked by visiting a malicious website (malicious_server.php). With this exploit local files may be uploaded to visited malicious websites without users consent. **Here's how to reproduce:** ``` 1. Edit exploit.html to have your test webservers address as the form action. 2. Serve malicious_server.php on a PHP enabled webserver, so you can access it with: http://yourwebserver.com/malicious_server.php 3. Place exploit.html into following folder: c:\windows\system32\drivers\etc\ (read: protocol seems picky about the file location) 4....

0%
暂无可用Exp或PoC
当前有0条受影响产品信息