Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft Internet Explorer XSS过滤机制绕过漏洞
Vulnerability Description
Internet Explorer是微软Windows操作系统中默认捆绑的WEB浏览器。 Microsoft Internet Explorer 8.0 Beta 2版本依靠 XDomainRequestAllowed HTTP头向不同的域授予数据交换权限,这会允许远程攻击者通过在一个CRLF序列后注入这个头信息,以绕过该产品的XSS过滤器保护机制并执行XSS和跨域攻击。它与"XDomainRequest Allowed Injection (XAI)" 有关。
CVSS Information
N/A
Vulnerability Type
N/A