// For flags

CVE-2003-0816

Microsoft Internet Explorer 5 - window.open Search Pane Cross-Zone Scripting

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.

Internet Explorer 6 SP1 y anteriores permite que atacantes remotos se salten restricciones de seguridad mediante: (1) uso del método NavigateAndFind para descargar un fichero, (2) uso del método window.open para cargar un fichero, (3) fijando la propriedad href en el tag base para la ventana _search, (4) cargando la venta de búsqueda en un Iframe, (5) capturando una URL de javascript en el histórico del navegador.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-09-10 First Exploit
  • 2003-09-18 CVE Reserved
  • 2004-01-14 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (32)
URL Tag Source
http://marc.info/?l=bugtraq&m=106321638416884&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106321693517858&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106321781819727&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106321882821788&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106322063729496&w=2 Mailing List
http://marc.info/?l=bugtraq&m=106322240132721&w=2 Mailing List
http://secunia.com/advisories/10192 Third Party Advisory
http://securitytracker.com/id?1007687 Vdb Entry
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2003-09/0146.html Mailing List
http://www.kb.cert.org/vuls/id/771604 Third Party Advisory
http://www.safecenter.net/UMBRELLAWEBV4/NAFfileJPU/NAFfileJPU-Content.htm X_refsource_misc
http://www.safecenter.net/UMBRELLAWEBV4/WsOpenFileJPU/WsOpenFileJPU-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/BackMyParent/BackMyParent-content.htm X_refsource_misc
http://www.safecenter.net/liudieyu/BackMyParent2/BackMyParent2-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/NAFjpuInHistory/NAFjpuInHistory-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/RefBack/RefBack-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/WsBASEjpu/WsBASEjpu-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/WsFakeSrc/WsFakeSrc-Content.HTM X_refsource_misc
http://www.safecenter.net/liudieyu/WsOpenJpuInHistory/WsOpenJpuInHistory-Content.HTM X_refsource_misc
http://www.securityfocus.com/archive/1/336937 Mailing List
http://www.securityfocus.com/archive/1/337086 Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A361 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A362 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A363 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A409 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A416 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A459 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A479 Signature
URL Date SRC
http://www.kb.cert.org/vuls/id/652452 2021-07-23
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
Ie
Search vendor "Microsoft" for product "Ie"
6.0
Search vendor "Microsoft" for product "Ie" and version "6.0"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
-
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.0.1
Search vendor "Microsoft" for product "Internet Explorer" and version "5.0.1"
sp3
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
-
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
sp1
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
5.5
Search vendor "Microsoft" for product "Internet Explorer" and version "5.5"
sp2
Affected
Microsoft
Search vendor "Microsoft"
Internet Explorer
Search vendor "Microsoft" for product "Internet Explorer"
6.0
Search vendor "Microsoft" for product "Internet Explorer" and version "6.0"
-
Affected