Описание
** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-3576
- http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0
- http://ha.ckers.org/blog/20070702/ie60-protocol-guessing
- http://osvdb.org/45813
- http://sla.ckers.org/forum/read.php?2%2C13209%2C13218
- http://sla.ckers.org/forum/read.php?2,13209,13218
- http://www.0x000000.com/?i=375
EPSS
CVE ID
Связанные уязвимости
Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar.
EPSS