Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Less critical

Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability

-

Release Date:  2007-02-26    Last Update:  2009-05-12    Views:  155,361

Secunia Advisory SA24314

Where:

You need to log in to view this

Impact:

You need to log in to view this

Solution Status:

You need to log in to view this

Software:

You need to log in to view this

CVE Reference(s):

You need to log in to view this

Description


Stefan Esser has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to conduct cross-site scripting attacks


You need to log in to the Secunia Community to view the full description of this advisory

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability

User Message
palisade RE: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Member 22nd Aug, 2010 19:52
Score: 37
Posts: 16
User Since: 26th Feb 2010
System Score: N/A
Location: US
Last edited on 22nd Aug, 2010 20:19
I have verified this exploit still works on the latest IE8. I also tested Chrome and Firefox, they are not vulnerable. I am going to try downloading the preview for IE9 and test that as well, I'll keep everyone here posted.

After that I am going to contact MS and see what their thoughts on this are.

Update: The IE9 preview is not vulnerable to this exploit. However, the preview is far from ready to be used as a replacement web browser for IE8 and it is not officially out yet. This vulnerability is not actually closed until MS fully releases IE9 to the public after the beta this September. Since they have solved this in IE9 there's no need for me to contact MS regarding this issue at this time.
Was this reply relevant?
+6
-0
firebreathingmonkey RE: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Member 14th Sep, 2010 09:47
Score: 6
Posts: 1
User Since: 14th Sep 2010
System Score: N/A
Location: UK
IE9 might fix the problem but this version of IE only runs on Windows Vista and Windows 7 (as far as I am aware) so users of Windows XP will still need the IE7 or IE8 patch introducing.
Was this reply relevant?
+6
-0
PetrolDave RE: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Member 9th Feb, 2011 11:28
Score: 0
Posts: 2
User Since: 9th Feb 2011
System Score: 100%
Location: UK
Last edited on 9th Feb, 2011 11:29
According to Wikipedia http://en.wikipedia.org/wiki/Usage_share_of_operat... 44% of all Windows installations are still using XP, so a patch of IE8 is essential - unless M$ are happy to leave this vulnerability open to nearly half of Windows users?
Was this reply relevant?
+3
-0
sp80 RE: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Member 21st Aug, 2013 12:01
Score: 0
Posts: 2
User Since: 22nd Apr 2009
System Score: N/A
Location: FR
Last edited on 21st Aug, 2013 12:01
Is this vulnerability still existing for a fully IE8 + WinXP configuration? What is Microsoft answer to this problem?
Thank you.

--
Regards
Was this reply relevant?
+0
-0
E.Jeppesen RE: Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability
Secunia Official 22nd Aug, 2013 09:25
Score: 220
Posts: 618
User Since: 24th Nov 2008
System Score: N/A
Location: Copenhagen, DK
I have not come across any official statement from Microsoft regarding this advisory but its status is unpatched. That means that no patch is available for this vulnerability which affects Internet Explorer 7.x and Internet Explorer 8.x. At this point I would be surprised if Microsoft decides to release a patch for this vulnerability from 2007. Do notice however that the criticality for the vulnerability is “Less Critical”. For an explanation of our terminology please see this page:
http://secunia.com/community/advisories/terminolog...


-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability