Vulnerability Description
Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | 8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47444
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47444
FAQ
What is CVE-2008-5555?
CVE-2008-5555 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter prot...
How severe is CVE-2008-5555?
CVE-2008-5555 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5555?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.