Vulnerability Description
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Content-Type header, as demonstrated by a header with a utf-7 charset value. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | 8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47441
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47441
FAQ
What is CVE-2008-5552?
CVE-2008-5552 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 allows remote attackers to bypass the XSS protection mechanism and conduct XSS attacks via a CRLF sequence in conjunction with a crafted Conten...
How severe is CVE-2008-5552?
CVE-2008-5552 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5552?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.