Microsoft Internet Explorer "XMLHTTP" HTTP Request Injection

Secunia Advisory:       SA16942 Print Advisory
Release Date:   2005-09-26

Critical:       
Moderately critical
Impact: Security Bypass
Manipulation of data
Exposure of sensitive information
Where:  From remote
Solution Status:        Unpatched

Software:       Microsoft Internet Explorer 6.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
Amit Klein has discovered a vulnerability in Microsoft Internet Explorer, which can be exploited by malicious people to manipulate certain data and conduct HTTP request smuggling attacks.

Input passed to the method parameter in the "open()" function in the "Microsoft.XMLHTTP" ActiveX control isn't properly sanitised before being used in a HTTP request. This can be exploited to inject arbitrary HTTP requests via specially crafted input containing tab and newline characters (spaces are not allowed).

Successful exploitation requires that the HTTP request is sent to a server or via a proxy allowing tab characters instead of spaces in certain parts of the HTTP request.

This is similar to vulnerability #3 in:
SA16911

The vulnerability has been confirmed on a fully patched system with Internet Explorer 6.0 and Microsoft Windows XP SP2. Other versions may also be affected.

Solution:
Set security level to "High".

Provided and/or discovered by:
Amit Klein

Other References:
SA16911:
http://secunia.com/advisories/16911/
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to