Vulnerability Description
Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | 6 |
References
- http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0Exploit
- http://ha.ckers.org/blog/20070702/ie60-protocol-guessing/Exploit
- http://osvdb.org/45813
- http://sla.ckers.org/forum/read.php?2%2C13209%2C13218
- http://www.0x000000.com/?i=375Exploit
- http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0Exploit
- http://ha.ckers.org/blog/20070702/ie60-protocol-guessing/Exploit
- http://osvdb.org/45813
- http://sla.ckers.org/forum/read.php?2%2C13209%2C13218
- http://www.0x000000.com/?i=375Exploit
FAQ
What is CVE-2007-3576?
CVE-2007-3576 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 cha...
How severe is CVE-2007-3576?
CVE-2007-3576 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3576?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.