Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310802203
HistoryJun 13, 2011 - 12:00 a.m.

Microsoft Internet Explorer Cookie Hijacking Vulnerability

2011-06-1300:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
15

6.3 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.5%

Internet Explorer is prone to a cookie hijacking vulnerability.

This VT has been replaced by OID:1.3.6.1.4.1.25623.1.0.902613.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802203");
  script_version("2023-06-27T05:05:30+0000");
  script_tag(name:"deprecated", value:TRUE);
  script_tag(name:"last_modification", value:"2023-06-27 05:05:30 +0000 (Tue, 27 Jun 2023)");
  script_tag(name:"creation_date", value:"2011-06-13 15:43:58 +0200 (Mon, 13 Jun 2011)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_cve_id("CVE-2011-2383");
  script_name("Microsoft Internet Explorer Cookie Hijacking Vulnerability");
  script_xref(name:"URL", value:"http://www.networkworld.com/community/node/74259");
  script_xref(name:"URL", value:"http://www.theregister.co.uk/2011/05/25/microsoft_internet_explorer_cookiejacking/");

  script_tag(name:"qod_type", value:"registry");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("Windows");

  script_tag(name:"impact", value:"Successful exploitation will allow remote attackers to read
  cookie files of the victim and impersonate users requests.");

  script_tag(name:"affected", value:"Internet Explorer Version 9.0 and prior.");

  script_tag(name:"insight", value:"The flaw exists due to the application which does not properly
  restrict cross-zone drag-and-drop actions, allows user-assisted remote
  attackers to read cookie files via vectors involving an IFRAME element with a
  SRC attribute containing an http: URL that redirects to a file: URL.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"summary", value:"Internet Explorer is prone to a cookie hijacking vulnerability.

  This VT has been replaced by OID:1.3.6.1.4.1.25623.1.0.902613.");

  script_xref(name:"URL", value:"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-057");

  exit(0);
}

exit(66); ## This VT is deprecated as addressed in secpod_ms11-057.nasl.

6.3 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.023 Low

EPSS

Percentile

89.5%

Related for OPENVAS:1361412562310802203