cve/2006/CVE-2006-3281.md

19 lines
1023 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2006-3281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3281)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear.
### POC
#### Reference
- http://www.kb.cert.org/vuls/id/655100
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-045
#### Github
No PoCs found on GitHub currently.