Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-5555

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2008-5555
Last Modified 24 Dec 2008 01:38:27
Published 12 Dec 2008 01:30:03
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-5555

Summary

Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."

Vulnerable Systems

Application

  • Microsoft Internet Explorer 8


References

XF - ie-xdomainrequestallowed-xss-filter-bypass(47444)

XF - ie-antixss-xss(47277)

BUGTRAQ - 20081211 Aspect9: Internet Explorer 8.0 Beta 2 Anti-XSS Filter Vulnerabilities


Last Updated: 27 May 2016 10:48:50