CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
87.3%
Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window’s zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the “Travel Log Cross Domain Vulnerability.”
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | ie | 6.0 | cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* |
microsoft | internet_explorer | 5.0 | cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* |
microsoft | internet_explorer | 5.0.1 | cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* |
microsoft | internet_explorer | 5.0.1 | cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* |
microsoft | internet_explorer | 5.0.1 | cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* |
microsoft | internet_explorer | 5.0.1 | cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:* |
microsoft | internet_explorer | 5.5 | cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* |
microsoft | internet_explorer | 5.5 | cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:* |
microsoft | internet_explorer | 5.5 | cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* |
microsoft | internet_explorer | 6.0 | cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* |
marc.info/?l=bugtraq&m=106979349517578&w=2
marc.info/?l=bugtraq&m=107038202225587&w=2
www.kb.cert.org/vuls/id/784102
www.safecenter.net/UMBRELLAWEBV4/BackToFramedJpu
www.us-cert.gov/cas/techalerts/TA04-033A.html
docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-004
exchange.xforce.ibmcloud.com/vulnerabilities/13846
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A630
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A643
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A687
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A689
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A745
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A774
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A805