CESA-2007-004 - rev 1


[See all my vulnerabilities at http://scary.beasts.org/security]

Internet Explorer PNG misdesign



Programs affected: Internet Explorer
Advisory release date: Oct 2nd 2007
Severity: Unexpected XSS attack vector

It seems that this is actually by design, and even documented, but it certainly surprised me. In fact, I'd use the phrase "egregiously unexpected". So it's worth a little note.

It is well known that Internet Explorer has weak (from a security point of view) content-type detection. It is very keen to see HTML in non-HTML content types. The best known example is looking for HTML in the first 256 characters of a plain text response (this misfeature is known as content type sniffing).

But did you know that you can get script execution via a perfectly well formed PNG image, served with the correct MIME type? The trick is just to put script in a PNG uncompressed comment chunk within the first 256 characters of the PNG.

Here is a sample PNG.


CESA-2007-004 - rev 1
Chris Evans
scarybeasts@gmail.com