Rapid7 Vulnerability & Exploit Database

Internet Explorer Iframe Sandbox File Name Disclosure Vulnerability

Back to Search

Internet Explorer Iframe Sandbox File Name Disclosure Vulnerability



It was found that Internet Explorer allows the disclosure of local file names. This issue exists due to the fact that Internet Explorer behaves different for file:// URLs pointing to existing and non-existent files. When used in combination with HTML5 sandbox iframes it is possible to use this behavior to find out if a local file exists. This technique only works on Internet Explorer 10 & 11 since these support the HTML5 sandbox. Also it is not possible to do this from a regular website as file:// URLs are blocked all together. The attack must be performed locally (works with Internet zone Mark of the Web) or from a share.


  • Yorick Koster




Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/gather/ie_sandbox_findfiles
msf auxiliary(ie_sandbox_findfiles) > show actions
msf auxiliary(ie_sandbox_findfiles) > set ACTION < action-name >
msf auxiliary(ie_sandbox_findfiles) > show options
    ...show and set options...
msf auxiliary(ie_sandbox_findfiles) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security