Vulnerability Description
The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protection mechanism and conduct XSS or redirection attacks, as demonstrated by the (1) Location and (2) Set-Cookie HTTP headers. NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | 8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47443
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47443
FAQ
What is CVE-2008-5554?
CVE-2008-5554 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The XSS Filter in Microsoft Internet Explorer 8.0 Beta 2 does not properly handle some HTTP headers that appear after a CRLF sequence in a URI, which allows remote attackers to bypass the XSS protecti...
How severe is CVE-2008-5554?
CVE-2008-5554 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5554?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.