First published: Fri Sep 17 2010(Updated: )
The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SharePoint Services | =3.0-sp2 | |
Microsoft Groove Management Server | =2010 | |
Internet Explorer | =8 | |
Microsoft SharePoint Server 2010 | =2007-sp2 | |
Microsoft SharePoint Foundation 2013 | =2010 | |
Microsoft Web Apps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3324 has a critical severity due to its potential for remote code execution through cross-site scripting attacks.
To fix CVE-2010-3324, ensure that you apply the latest security updates and patches provided by Microsoft for the affected software.
CVE-2010-3324 affects Microsoft Internet Explorer 8, SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps.
The potential impacts of CVE-2010-3324 include unauthorized access to sensitive data and user accounts through successful cross-site scripting exploitation.
Yes, there have been reports of exploit attempts in the wild targeting CVE-2010-3324.