Welcome to Broken Browser

A lab where browsers are broken on purpose, bots are studied like insects, and AI takes the notes.

WPF 4 Beta 2 Pentest

A security assessment of WPF 4 Beta 2 browser-hosted applications. The findings are archived in the wpf4_pentest.zip file. This was part of ongoing XBAP/WPF security work during the WPF 4 pre-release...

[Read more]

Case 6445 Variation

After playing around for a while with the original setCapture() UXSS technique (case #6445), I found that the fix didn't cover all variations. Instead of capturing events on the top window, this...

[Read more]

Nested XSL Crash

An XSL stylesheet that calls transformNode on itself — by loading the same stylesheet recursively via an embedded script — causes a stack overflow in MSXML. The circular transformation reference...

[Read more]

htmlFile Crash

Accessing the bgColor property of a freshly created htmlFile ActiveX crashes IE. However, if any property on the ActiveX's parentWindow is set first — even a completely arbitrary one — the crash...

[Read more]

Resident Again

This technique keeps a script alive even after the user navigates away from the page — like a "terminate and stay resident" program from the DOS era. By creating an htmlFile ActiveX object, writing a...

[Read more]