First published: Wed Jan 14 2004(Updated: )
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-sp1 | |
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp3 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0814 is considered a high severity vulnerability due to its ability to bypass security restrictions and execute arbitrary scripts.
To fix CVE-2003-0814, it is recommended to upgrade to a newer version of Internet Explorer that is not affected by this vulnerability.
CVE-2003-0814 affects Internet Explorer versions 5.0.1 SP1 and later, up to 6.0 SP1.
CVE-2003-0814 can be exploited by remote attackers to execute malicious JavaScript code through cross-domain script execution.
A potential workaround for CVE-2003-0814 is to disable JavaScript execution in the affected Internet Explorer versions.