[<prev] [next>] [day] [month] [year] [list]
Message-ID: <f4cd4c010611241112s74dad423o4f00a574c7e0bd67@mail.gmail.com>
Date: Fri, 24 Nov 2006 19:12:32 +0000
From: "David Kierznowski" <david.kierznowski@...il.com>
To: full-disclosure@...ts.grok.org.uk,
"Webappsec Mail List" <webappsec@...urityfocus.com>,
security-basics@...urityfocus.com
Subject: CSRF with MS Word
CSRF with MS Word
Our attack vector is found in exploiting MSWord's frame capabilities:
By creating malicious frames in a document and pointing them to a
malicious URL, we can exploit multiple, persistent (well almost, this
is limited) CSRF vulnerabilities (and possibly the browser).
See:
http://michaeldaw.org/md-hacks/csrf-with-msword/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists