| Vulnerability Name: | CCN-5566 | ||||||
| Published: | 2000-11-23 | ||||||
| Updated: | 2000-11-23 | ||||||
| Summary: | Microsoft Internet Explorer allows a malicious Web site operator to inject executable code in the index.dat file, by including Javascript in a URL. Internet Explorer uses the index.dat file to store recently visited URLs and maintain a listing of subfolders in the Temporary Internet Files folder. After code is injected into index.dat, the attacker can parse the file to execute the code, using the OBJECT TYPE="text/html" variable to bypass security restrictions in Internet Explorer. When the file is parsed, the JavaScript executes as trusted code, because index.dat is registered as local content by the Internet Explorer security mechanism.
A malicious Web site operator could use this to execute any malicious JavaScript on a visiting user's computer, including code that would list the names of the cache folders in the Temporary Internet Folders directory. If an attacker knows the names of the cache folders, the attacker can execute other files that have been downloaded to the visiting user's computer and cached in these folders. | ||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
| CVSS v2 Severity: | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
| Vulnerability Consequences: | Gain Access | ||||||
| References: | Source: CCN Type: BugTraq Mailing List, Thu Nov 23 2000 - 09:50:01 CST OBJECT TYPE="text/html" may allow executing arbitrary programs in IE 5.5 Source: CCN Type: Georgi Guninski Security Advisory #29 OBJECT TYPE="text/html" may allow executing arbitrary programs in IE 5.5 Source: CCN Type: Georgi Guninski Vulnerability Demonstration OBJECT DATA="text/html" may allow executing arbitrary programs in IE 5.5 demo Source: CCN Type: Microsoft Security Bulletin MS00-055 Patch Available for "Scriptlet Rendering" Vulnerability Source: CCN Type: Microsoft Security Bulletin MS00-093 Patch Available for "Browser Print Template" and "File Upload via Form" Vulnerabilities Source: CCN Type: Microsoft Security Bulletin MS01-015 IE can Divulge Location of Cached Content Source: CCN Type: Microsoft Security Bulletin MS01-027 Flaws in Web Server Certificate Validation Could Enable Spoofing Source: CCN Type: BID-1978 Microsoft Internet Explorer 5.5 Index.dat Vulnerability Source: XF Type: UNKNOWN ie-index-execute-code(5566) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||