Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2008-1544
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote attackers to (1) conduct HTTP request splitting and HTTP request smuggling attacks via an incorrect Content-Length header, (2) access arbitrary virtual hosts via a modified Host header, (3) bypass referrer restrictions via an incorrect Referer header, and (4) bypass the same-origin policy and obtain sensitive information via a crafted request header..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.1/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.9/10
- Confidentiality Impact
- Complete
- Availability Impact
- None
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*: |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*: |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*: |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:*:pro_x64:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* |
No
|
- |
References
- http://www.mindedsecurity.com/MSA02240108.html
- http://secunia.com/advisories/29453
- http://securityreason.com/securityalert/3785
- http://www.us-cert.gov/cas/techalerts/TA08-162B.html
- http://www.securityfocus.com/bid/28379
- http://marc.info/?l=bugtraq&m=121380194923597&w=2
- http://www.securitytracker.com/id?1020226
- http://www.vupen.com/english/advisories/2008/1778
- http://www.vupen.com/english/advisories/2008/0980
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5
- http://www.securityfocus.com/archive/1/489954/100/0/threaded
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-031