Hello fellow bug hunter! Today we are going back to Internet Explorer which despite getting old, tons people still use it. I am much happier with MSRC lately, they are really moving forward regarding...
Welcome to MagicMac Labs
Welcome to my pint-sized mad lab—where ambition meets incompetence! Here, I clumsily tinker with web browsers like a digital Frankenstein (spoiler: my monsters crash spectacularly), dabble in the stock market (mostly losing money and blaming algorithms), and unleash random thoughts (as coherent as my coding, which is to say, a total dumpster fire)—all in a desperate bid to learn something before I accidentally blow up my computer... or my life savings.
SOP bypass / UXSS - Stealing Credentials Pretty Fast (Edge)
Today we are going to steal Twitter and Facebook credentials from the user. The previous two SOP bypasses [[1]](../sop-bypass-abusing-read-protocol/)...
SOP bypass / UXSS - Tweeting like Charles Darwin (Edge)
Watch the 2 minutes exploit video where we manually tweet as if we were Charles Darwin, and get his password (thanks to the default password manager of Microsoft Edge). If you are out of time, watch...
SOP bypass courtesy of the reading mode (Edge)
The Microsoft Edge team recently tweeted about the reading mode, a feature that removes the clutter from webpages to read without distractions. It was not new to me, I learned about it when I was...
Detecting Installed Extensions (Edge)
Attackers love being able to fingerprint their victims. We've seen in the past two techniques that allowed the bad guys to detect the presence of particular files (to evade analysts) and even get the...
Defeating the popUp blocker, the XSS filter and SuperNavigate with our fake ticket to the Intranet Zone (Edge)
Last year we explored the domainless blank technique to create UXSS/SOP bypasses on both Microsoft Edge and Internet Explorer. The Edge version has been recently patched but unfortunately the fix...
Referrer spoofing with iframe injection (Edge)
Last year we've been playing with a very simple method to spoof the referrer on Edge, which allowed us of course to spoof the referrer and -as a bonus- other neat things like bypass the XSS filter....
SOP bypass / UXSS - More Adventures in a Domainless World (IE)
A few months ago we've been playing with domainless about:blank pages on Edge. Essentially, a powerful about:blank document was capable of accessing every domain without restrictions. It was recently...
Bypassing the patch to keep spoofing the Smartscreen/Malware warning (Edge)
Yesterday, Microsoft pushed a gigantic update where tons of security bugs were fortunately killed, including most ones from this website. Kudos, big kudos to the Edge developers and the ones in...
The Attack of the Alerts and the Zombie Script (IE)
In our previous post we found a way to UXSS (bypass the SOP policy) using the htmlFile/ActiveXObject, however, I mentioned that there were other interesting things to do using that same object. Have...
SOP bypass / UXSS htmlFile in IFrame (IE)
Today we are going to explore a feature that has been present on Internet Explorer almost since its inception. A feature that allows web-developers to instantiate external objects, and because of...
SOP bypass / UXSS - Adventures in a Domainless World (Edge)
Today we are going to walk around a few design issues that, when used together, will end up in a full SOP bypass or Universal Cross Site Scripting (UXSS) on Microsoft Edge. If you are not a security...
Spoofing the address bar and the SmartScreen/Malware Warning (Edge)
Update: this bug was patched on 2017-03-14 but we found a bypass the same day. Here it is: Bypassing the patch to continue spoofing the address bar and the Malware Warning. Over the last few...
Abusing of Protocols to Load Local Files, bypass the HTML5 Sandbox and Open Popups (Edge)
On October 25th, the fellows @MSEdgeDev twitted a link that called my attention because when I clicked on it (being on Chrome) the Windows Store App opened. It might not surprise you, but it...
Bypassing Mixed Content Warnings - Loading Insecure Content in Secure Pages (Edge/IE)
There are no doubts that the web is moving forward to HTTPS (secure) content. Most important names have today their certificates ready and their websites are in effect, secure. But have you ever...
Detecting Local Files to Evade Analysts (IE)
Last month we've been looking at how attackers were targeting unsavvy users by checking the associated mimeTypes to applications on the system. If the PC had analyst tools installed, something...
On Patching Security Bugs
Hello fellow bug hunter! I want to share with you my thoughts on a slight change that the folks at Microsoft could embrace to make security better. This change, in my opinion, will make the...
Workers SOP Bypass importScripts and baseHref (Edge/IE)
As we know, all browsers impose several restrictions when trying to access resources from different origins. Of course we can play music and render images coming from different domains but thanks to...
Detecting analysts before installing the malware (IE)
With the help of a beautiful piece of code, malware authors can detect installed applications straight from within the browser and serve the bad bits only to unsavvy users. In other words, attackers...
Referer spoofing and defeating the XSS filter (Edge/IE)
According to Wikipedia, "Referer spoofing is the sending of incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page...
CSS History Leak or "I know where you've been" (Edge)
Hello fellow bug hunter! I've been thinking this morning about an old CSS trick, where you could find out which sites were visited by the user. If you are not familiar with this one, I recommend...
Grabbing data from Inputs and Textareas (Edge/IE)
Both Microsoft Edge and Internet Explorer suffer from navigation problems, failing to keep up with the most updated history information. A framed navigation confuses these browsers and what seems to...