CVE-2008-5552
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a utf-7 charset value. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
El filtro XSS (ejecución de secuencias de comandos en sitios cruzados) en Microsoft Internet Explorer 8.0 Beta 2 permite a atacantes remotos saltar el mecanismo de protección XSS y generar ataques XSS mediante una secuencia CRLF junto con una cabecera Content-Type manipulada, como se demostró por una cabecera con un valor de charset utf-7. NOTA: El fabricante mantiene que el filtro XSS de manera intencionada no intenta "abordar todas las hipótesis de ataque XSS".
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-12-12 CVE Reserved
- 2008-12-12 CVE Published
- 2024-07-28 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/499124/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47277 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47441 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Internet Explorer Search vendor "Microsoft" for product "Internet Explorer" | 8 Search vendor "Microsoft" for product "Internet Explorer" and version "8" | beta2 |
Affected
|