Overview
Microsoft Internet Explorer contains a vulnerability in which a script from one source is permitted to access files on the client's file system. An attacker may be able to read cookies and other files on a target system, and spoof Internet sites by creating believable window titles.
Description
Microsoft Internet Explorer features the ability to process scripting code contained in HTML documents. This feature is known as Active scripting, and one of the supported languages is called JScript. JScript is similar to Netscape's JavaScript, and both languages played some part in the development of ECMAScript, which is defined in ECMA-262. In JScript, the open method is used to access a document or to open a browser window, and the close method is typically used to close the document or window. The open method takes an argument that specifies either the MIME type (text/html only) of the document or a URL to render in a new browser window. |
Impact
By convincing a user to view a malicious web page or HTML email message, a remote attacker can read cookies and certain types of files on the target host and spoof Internet sites. |
Solution
Apply Patch |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered by "the Pull"
This document was written by Ian A. Finlay and Art Manion.
Other Information
CVE IDs: | CVE-2002-0027 |
Severity Metric: | 28.08 |
Date Public: | 2001-12-19 |
Date First Published: | 2001-12-21 |
Date Last Updated: | 2003-05-14 00:00 UTC |
Document Revision: | 65 |