{"vuid":"VU#156123","idnumber":"156123","name":"Microsoft Office Web Components allows arbitary user to determine whether local file exists via Chart component \"Load\" method","keywords":["Microsoft Office","Office Web Components","local file exists","Chart component","Load method"],"overview":"Microsoft Office Web Components (OWC) allows a malicious script on a web page to learn if a file exists on the client's filesystem.","clean_desc":"OWC allows viewing of Microsoft Office documents such as spreadsheets and charts to be viewed within an HTML document in Microsoft Internet Explorer (IE). OWC is included with Microsoft Office and can also be downloaded for free from Microsoft's web site. By default, it is marked safe for scripting by ActiveX and other scripting components. The Load method of OWC's Chart component opens a file specified by a Uniform Resource Index (URI) without checking the validity of the URI. If the URI points to the client's local filesystem, the Load method will attempt to open the file at that location. If the file does not exist, the method will return an error. If the file exists, the method does not return the error. A malicious script can use the result to determine if the file exists.","impact":"A malicious script can test any location on the client's filesystem for existence of files, thereby learning what files exist locally and on accessible network drives.","resolution":"The CERT/CC is currently unaware of patches or other software updates to resolve this problem.","workarounds":"Remove OWC. If OWC was installed with Microsoft Office, choose \"Add/Remove Components\" from the Microsoft Office Setup interface. If OWC was installed separately from Office, choose \"Add/Remove Programs\" in Windows.","sysaffected":"","thanks":"Thanks to GreyMagic Software for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://security.greymagic.com/adv/gm008-ie/","http://www.securityfocus.com/bid/4454"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-04-15T22:20:32Z","publicdate":"2002-04-08T00:00:00Z","datefirstpublished":"2002-09-24T15:51:29Z","dateupdated":"2002-09-24T15:51:33Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"4","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.7","cam_scorecurrentwidelyknown":"3.6","cam_scorecurrentwidelyknownexploited":"7.2","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.7,"vulnote":null}