Microsoft Internet Explorer XSS过滤器双重注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117003 漏洞类型 跨站脚本
发布时间 2008-12-11 更新时间 2009-01-29
CVE编号 CVE-2008-5551 CNNVD-ID CNNVD-200812-237
漏洞平台 Windows CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/32654
https://cxsecurity.com/issue/WLB-2008120027
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-237
|漏洞详情
InternetExplorer是微软Windows操作系统中默认捆绑的WEB浏览器。MicrosoftInternetExplorer8.0Beta2版本的XSS过滤器允许远程攻击者通过向一个HTML文件中的两个不同位置注入数据,以绕过XSS保护机制并执行XSS攻击。该漏洞与CSS表达式属性和STYLE元件相关,又称一个"双重注入"。
|漏洞EXP
source: http://www.securityfocus.com/bid/32780/info

Microsoft Internet Explorer is a web browser for the Microsoft Windows operating system.

Internet Explorer 8 includes a cross-site-scripting filter that is designed to prevent cross-site-scripting attacks against vulnerable web applications. Attackers may be able to bypass this filter under certain conditions, such as by taking advantage of an existing vulnerability in a web application.

Internet Explorer 8 beta 2 is vulnerable. 

} BODY{a:expression(alert('hi'))};</style>***<style>***
|参考资料

来源:XF
名称:ie-antixss-xss(47277)
链接:http://xforce.iss.net/xforce/xfdb/47277
来源:BID
名称:32780
链接:http://www.securityfocus.com/bid/32780
来源:BUGTRAQ
名称:20081211Aspect9:InternetExplorer8.0Beta2Anti-XSSFilterVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/499124/100/0/threaded
来源:SREASON
名称:4724
链接:http://securityreason.com/securityalert/4724