Lucene search

K
nvd[email protected]NVD:CVE-2008-5555
HistoryDec 12, 2008 - 6:30 p.m.

CVE-2008-5555

2008-12-1218:30:03
CWE-79
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.4%

Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product’s XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to “XDomainRequest Allowed Injection (XAI).” NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to “address every conceivable XSS attack scenario.”

Affected configurations

NVD
Node
microsoftinternet_explorerMatch8beta2

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.4%

Related for NVD:CVE-2008-5555