Author:Lcx
I have read two articles recently. One isGoogle Chrome's local file reading vulnerability using ajax, The other isLocal ajax execution permission problemsI think this is not a security issue. It seems that these two articles do not have sufficient knowledge about the permissions of local html.
For exampleHtml reads local txt content, One isHtml operations on local databasesThe key is that the user is allowed to execute local js.
If you do not know that the html permission is large enough, execute the relevant html in C: WINDOWSpchealthhelpctrSystemsysinfo, such as C: WINDOWSpchealthhelpctrSystemsysinfosysinfosum.htm, And you have enough solutions.
If the user has the permission to execute local active operations, the IE is not based on the browser version, such as html "target = _ blank>Html reads local txt contentIt is also applicable in IE8 (win7 + ie8 and XP SP2 + ie7 passed the test ). Therefore, I think it is of little significance for the xeye team to test the browser and test ajax to read local content, the user is allowed to execute local js.
It is a security issue if no prompt is provided. For example, if ms06014 has been patched on the XP system, you can execute ms06014 locally. If you allow all the executions to agree, it can also be executed.
I hope that the authors of the above two articles will not scold me.