Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2007/Feb/0081.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/411585 - Exploit | |
References | () http://www.securityfocus.com/archive/1/459172/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/14969 - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:05
NVD link : CVE-2005-4827
Mitre link : CVE-2005-4827
CVE.ORG link : CVE-2005-4827
JSON object : View
Products Affected
microsoft
- internet_explorer
- ie
canon
- network_camera_server_vb101
CWE