Cross-zone scripting


Cross-zone scripting is a browser exploit taking advantage of a vulnerability within a zone-based security solution. The attack allows content in unprivileged zones to be executed with the permissions of a privileged zone - i.e. a privilege escalation within the client executing the script. The vulnerability could be:
A common attack scenario involves two steps. The first step is to use a cross-zone scripting vulnerability to get scripts executed within a privileged zone. To complete the attack, then perform malicious actions on the computer using insecure ActiveX components.
This type of vulnerability has been exploited to silently install various malware onto computers browsing a malicious web page.

Origins of the zone concept

There are four well known zones in Internet Explorer:
These zones are explained in detail by "How to use security zones in Internet Explorer".
There is also an additional hidden zone:
Local intranet, Trusted sites and Local Computer are usually configured to be privileged zones. Most cross-zone scripting attacks are designed to jump from Internet zone to a privileged zone.

Examples

Into the local computer zone

This type of exploit attempts to execute code in the security context of Local Computer Zone.
The following HTML is used to illustrate a naive attempt of exploitation:






A computer which considers intranet.example.com a part of Local Intranet zone will now successfully be cross zone scripted.

Into the trusted sites zone

A well-known example is the bug in Internet Explorer 6. It was discovered that the following URL

http://windowsupdate.microsoft.com%2f.example.com/

executed with "Trusted Sites" permission if was listed as a trusted site.