First published: Fri Jun 03 2011(Updated: )
Microsoft Internet Explorer 9 and earlier does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing an http: URL that redirects to a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue, aka "Drag and Drop Information Disclosure Vulnerability." NOTE: this vulnerability exists because of an incomplete fix in the Internet Explorer 9 release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Internet Explorer | =9-beta | |
Internet Explorer | <=9 | |
Internet Explorer | =3.0 | |
Internet Explorer | =4.0 | |
Internet Explorer | =5 | |
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2383 is considered a moderate severity vulnerability due to the potential for information disclosure.
To fix CVE-2011-2383, users should upgrade to a newer version of Microsoft Internet Explorer that does not have this vulnerability.
CVE-2011-2383 affects Microsoft Internet Explorer versions 3.0 through 9.0.
CVE-2011-2383 is associated with user-assisted remote attacks that exploit cross-zone drag-and-drop actions.
Yes, CVE-2011-2383 can allow attackers to read cookie files if exploited correctly.