Vulnerability Description
Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Xml Core Services | All versions |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=380418
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48815
- https://bugzilla.mozilla.org/show_bug.cgi?id=380418
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48815
FAQ
What is CVE-2009-0419?
CVE-2009-0419 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response h...
How severe is CVE-2009-0419?
CVE-2009-0419 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0419?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Xml Core Services.