Acidus wrote: RSnake is a fucking genius. Using a file:/// URL pointed at the manual PDF installed with Acrobat, you can execute JavaScript in the local zone. Oh yeah, local file access, program execution, completely uncrippled XmlHttpRequest. This is not good.
SANS is reporting that Adobe 8 is non susceptible to the original http:// URL vuln. Is it your experience that Adobe 8 mitigates both of these vulnerabilities? Also, the file:/// URL vuln would need to be version specific, yes? Since Adobe installs the documentation PDF in a point rev numbered directory. My IE6 SP2 prompts for unsafe ActiveX confirmation before the plugin is even called when using the file:/// method. RE: It hits the fan! |