The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote attackers to (1) conduct HTTP request splitting and HTTP request smuggling attacks via an incorrect Content-Length header, (2) access arbitrary virtual hosts via a modified Host header, (3) bypass referrer restrictions via an incorrect Referer header, and (4) bypass the same-origin policy and obtain sensitive information via a crafted request header.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
07 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE |
Information
Published : 2008-03-28 23:44
Updated : 2024-02-04 17:33
NVD link : CVE-2008-1544
Mitre link : CVE-2008-1544
CVE.ORG link : CVE-2008-1544
JSON object : View
Products Affected
microsoft
- windows_xp
- internet_explorer
- windows_server_2008
- windows_2000
- windows_vista
- windows_server_2003
CWE
CWE-20
Improper Input Validation