CVE-2004-1104
Microsoft Internet Explorer 6 - HTML Form Tags URI Obfuscation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Microsoft Internet Explorer 6.0 SP2 allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page that contains a BASE element that points to the legitimate site, followed by an anchor (a) element with an empty "href" attribute, and a FORM whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL.
Microsoft Internet Explorer 6.0 SP2 permite a atacantes remotos suplantar una URL legítima en la barra de estado y realizar un ataque de 'phishing' mediante una página web que contenga un elemento BASE que apunta al sitio legítimo seguido de un elemento ancla (A) con un elemento "href" vacío y un elemento FORM que apunta a un sitio web malicioso, y un elemento 'INPUT' modificado para que se parezca a la URL legítima.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2004-10-30 First Exploit
- 2004-11-30 CVE Reserved
- 2004-12-01 CVE Published
- 2024-06-08 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/11273 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/702086 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/379903 | Mailing List | |
http://www.securityfocus.com/archive/1/425386/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/425883/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17938 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/24714 | 2004-10-30 | |
http://www.securityfocus.com/bid/11565 | 2024-08-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|