Short Name |
HTTP:STC:IE:EXEC-CMD-FILE-SPOOF |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
HTTP |
Keywords |
Internet Explorer execCommand File-type Spoofing |
Release Date |
2004/11/23 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the way that Internet Explorer handles the JavaScript execCommand function. Attackers can trick a user into saving a file that the user thinks is HTML, but is actually an executable file; consequently empowering the attacker to execute arbitrary code on the affected system.
Microsoft Internet Explorer is reported prone to a file download security warning bypass vulnerability. This issue may be exploited to download a malicious file to the client system. When a URI location is not found the user usually receives a 404 error message. It is reported that this issue allows an attacker to create a custom HTTP 404 error message and use the 'execCommand' method to save a Web page to the local system. By enticing a user to follow a malicious link the attacker can plant malicious files on vulnerable systems in order to execute malicious code.