Wednesday, April 23, 2025
HomeVulnerabilityMicrosoft Edge Browser Vulnerability Allows Malicious Hackers Steal Your Computer Local Files

Microsoft Edge Browser Vulnerability Allows Malicious Hackers Steal Your Computer Local Files

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered in Microsoft Edge Browser vulnerability allows attackers stealing the computer local files from victims who all are using a vulnerable version of the Edge browser.

This Edge Browser Vulnerability exists in the version 17.8600.40445.0 where the researcher tested and successfully exploits this vulnerability.

Edge browser brought many new security futures and the team behind the Edge has always focused with well defined  Content Security Policy (CSP).

- Advertisement - Google News

In this case, the researcher identified the flaw in Same Origin Policy (SOP) that allows special format of the URL can inject into the browser and the attacker can read the content of any local file.

Edge Browser Vulnerability Attack Scenario

Basically, SOP functioning Edge browser and other SOP support browsers prevent from an attacker who tries to read the file from users computer by loading the malicious URL.

Because the Protocol and the port need to match if the attacker needs to access the local data using JavaScript-issued request, but it’s not possible since the 2 protocols(( file://https://)) is totally different.

In this case, the Attacker can’t read the local files. but it could be bypassed using another scenario using TWO files URLs neither have a hostname nor a port.

So the attack can be achieved by using two file URLs(file://) that eventually form the same origin in the targeted system because,

  • The port matches: Both have no port
  • The hostname matches: There is no hostname on both of them
  • The protocol scheme matches: Both use the file:// scheme

Attacker Need to Trick the Victim

In this case, Edge’s SOP failed to validate the two same URLs because that has no port, no hostname, also it belongs to same protocol(file://) and the attacker can trick the victims and let them open the malicious HTML file.

Html file contains malicious code that loads the local file:// protocol, as we discussed above, that neither has a hostname nor a port.

Eventually, once the victims execute the malicious URL then it will load into the local system and read the local files in victims computer.

Researchers Albeniz said, I drafted an email from another computer, added the file as an attachment and then opened the attachment in the Mail and Calendar app. Much to my surprise, it worked. I expected that the app, like the Edge browser, would block the attachment.
But this was not the case at all. When I sent the email as an attachment and waited until a user opened it, it would immediately send local files of my choosing to my server, where I could store and read them. There is probably no antivirus program that would recognize my file as malicious, and, I could extract the files over a secure HTTPS connection.

So In order to protect from this attacker, all the Edge user need to update their browsers and Windows Mail and Calendar applications. also, avoid opening attachments from unknown senders.

This vulnerability can exploit using following POC code by changing it in HTML file.

<html> <head> <script> let resultDiv = document.getElementById("result");     let xhr= new XMLHttpRequest();     let user = document.location.href.match(/file:\/\/\/C:\/Users\/([a-z0-9\-]*)\//i)[1];     xhr.open("GET",'file://C:/Users/${user}/Desktop/secret.txt");     xhr.onreadystatechange = ()=> {      if(xhr.readyState==4) {      resultDiv.innerText = xhr.responseText;      }     }     xhr.send(); </script> </head> <body> </body> <div id="result"></div> </html>
Microsoft fixed the vulnerability (CVE-2018-0871) and release Patch June 2018 security updates.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that...

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as...

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that...

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021,...

Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls

Zyxel, a leading provider of secure networking solutions, has released critical security patches to...