Microsoft Internet Explorer 10 and 11 load different files for attempts to open a file:// URL depending on whether the file exists, which allows local users to enumerate files via vectors involving a file:// URL and an HTML5 sandbox iframe, aka "Internet Explorer Information Disclosure Vulnerability."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095 | vendor advisory |
http://www.securitytracker.com/id/1036562 | vdb entry |
https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html | third party advisory vdb entry |
http://seclists.org/fulldisclosure/2016/Aug/44 | third party advisory mailing list |
http://www.securityfocus.com/archive/1/539174/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/92291 | vdb entry |