First published: Sat Dec 31 2005(Updated: )
Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =6.0-windows_xp_sp2 | |
Microsoft Internet Explorer | =6-windows_2000_sp4 | |
Microsoft Internet Explorer | =6 | |
Canon Network Camera Server VB101 | ||
Microsoft Internet Explorer | =6.0 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1_itanium_systems | |
Microsoft Internet Explorer | =6.0 | |
Microsoft Internet Explorer | =6.0-sp1 | |
Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6 | |
Microsoft Internet Explorer | =6.0-sp2 | |
Microsoft Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6.0-sp1 | |
Microsoft Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6.0-sp1 | |
Microsoft Internet Explorer | =6.0-sp2 | |
Microsoft Internet Explorer | =6 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1 | |
Microsoft Internet Explorer | =6-windows_server_2003_sp1_itanium | |
Microsoft Internet Explorer | =6.0 | |
Microsoft Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6-sp1 | |
Microsoft Internet Explorer | =6 | |
Microsoft Internet Explorer | =6-windows_xp_sp2 | |
Internet Explorer | =6.0.2600 | |
Internet Explorer | =6.0 | |
Internet Explorer | =6.0.2800 | |
Internet Explorer | =6.0.2800.1106 | |
Internet Explorer | =6.0.2900.2180 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4827 is rated as a high severity vulnerability that allows attackers to bypass the same origin security policy in Internet Explorer.
To fix CVE-2005-4827, users should update their Internet Explorer to the latest version provided by Microsoft.
CVE-2005-4827 affects Internet Explorer versions 6.0 and may also impact earlier versions.
CVE-2005-4827 can be exploited by remote attackers to make requests to unauthorized domains using XMLHttpRequest objects.
As a temporary workaround for CVE-2005-4827, users can disable JavaScript or use different web browsers until an update is applied.