Lucene search

K
seebugRootSSV:4799
HistoryFeb 19, 2009 - 12:00 a.m.

Microsoft XML Core Services XMLHttpRequest SetCookie2头信息泄露漏洞

2009-02-1900:00:00
Root
www.seebug.org
122

0.004 Low

EPSS

Percentile

74.6%

BUGTRAQ ID: 33803
CVE(CAN) ID: CVE-2009-0419

Microsoft XML Core Services(MSXML)允许使用JScript、VBScript和Visual Studio 6.0的用户开发基于XML的应用,以与其他遵循XML 1.0标准的应用程序交互操作。

Microsoft XML Core Services没有正确地限制网页对Set-Cookie2 HTTP响应头的访问,远程攻击者可以通过XMLHttpRequest调用绕过HTTPOnly保护机制读取敏感信息。

Microsoft XML Core Services 6.0
Microsoft XML Core Services 5.0
Microsoft XML Core Services 4.0
Microsoft XML Core Services 3.0
厂商补丁:

Microsoft

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

<a href=“http://www.microsoft.com/technet/security/” target=“_blank”>http://www.microsoft.com/technet/security/</a>


                                                +&lt;html&gt;
+&lt;!--
+https://bugzilla.mozilla.org/show_bug.cgi?id=380418
+--&gt;
+&lt;head&gt;
+  &lt;title&gt;Test for Bug 380418&lt;/title&gt;
+  &lt;script type=&quot;text/javascript&quot; src=&quot;/MochiKit/MochiKit.js&quot;&gt;&lt;/script&gt;
+  &lt;script type=&quot;text/javascript&quot; src=&quot;/tests/SimpleTest/SimpleTest.js&quot;&gt;&lt;/script&gt;        
+  &lt;link rel=&quot;stylesheet&quot; type=&quot;text/css&quot; href=&quot;/tests/SimpleTest/test.css&quot; /&gt;
+&lt;/head&gt;
+&lt;body&gt;
+&lt;a target=&quot;_blank&quot; href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=380418&quot;&gt;Mozilla Bug 380418&lt;/a&gt;
+&lt;p id=&quot;display&quot;&gt;&lt;/p&gt;
+&lt;div id=&quot;content&quot; style=&quot;display: none&quot;&gt;
+  
+&lt;/div&gt;
+&lt;pre id=&quot;test&quot;&gt;
+&lt;script class=&quot;testbody&quot; type=&quot;text/javascript&quot;&gt;
+
+/** Test for Bug 380418 **/
+
+SimpleTest.waitForExplicitFinish();
+
+var request = new XMLHttpRequest();
+request.open(&quot;GET&quot;, window.location.href, false);
+request.send(null);
+
+// Add fake Set-Cookie and X-Dummy response headers
+netscape.security.PrivilegeManager.enablePrivilege(&quot;UniversalXPConnect UniversalBrowserRead&quot;);
+var channel = request.channel.QueryInterface(Components.interfaces.nsIHttpChannel);
+channel.setResponseHeader(&quot;Set-Cookie&quot;, &quot;test&quot;, false);
+channel.setResponseHeader(&quot;X-Dummy&quot;, &quot;test&quot;, false);
+
+// Try reading headers in privileged context
+is(request.getResponseHeader(&quot;Set-Cookie&quot;), &quot;test&quot;, &quot;Reading Set-Cookie response header in privileged context&quot;);
+is(request.getResponseHeader(&quot;X-Dummy&quot;), &quot;test&quot;, &quot;Reading X-Dummy response header in privileged context&quot;);
+
+ok(/\bSet-Cookie:/i.test(request.getAllResponseHeaders()), &quot;Looking for Set-Cookie in all response headers in privileged context&quot;);
+ok(/\bX-Dummy:/i.test(request.getAllResponseHeaders()), &quot;Looking for X-Dummy in all response headers in privileged context&quot;);
+
+// Try reading headers in unprivileged context
+setTimeout(function() {
+  is(request.getResponseHeader(&quot;Set-Cookie&quot;), null, &quot;Reading Set-Cookie response header in unprivileged context&quot;);
+  is(request.getResponseHeader(&quot;X-Dummy&quot;), &quot;test&quot;, &quot;Reading X-Dummy response header in unprivileged context&quot;);
+  
+  ok(!/\bSet-Cookie:/i.test(request.getAllResponseHeaders()), &quot;Looking for Set-Cookie in all response headers in unprivileged context&quot;);
+  ok(/\bX-Dummy:/i.test(request.getAllResponseHeaders()), &quot;Looking for X-Dummy in all response headers in unprivileged context&quot;);
+
+  SimpleTest.finish();
+}, 0);
+
+&lt;/script&gt;
+&lt;/pre&gt;
+&lt;/body&gt;
+&lt;/html&gt;

                              

0.004 Low

EPSS

Percentile

74.6%

Related for SSV:4799