Microsoft Internet Explorer 8 - CSS 'expression' Property Cross-Site Scripting Filter Bypass
Author: Rafel Ivgi
type: remote
platform: windows
port:
date_added: 2008-12-11
date_updated: 2014-04-02
verified: 1
codes: CVE-2008-5551;OSVDB-57062
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/32780/info
Microsoft Internet Explorer is a web browser for the Microsoft Windows operating system.
Internet Explorer 8 includes a cross-site-scripting filter that is designed to prevent cross-site-scripting attacks against vulnerable web applications. Attackers may be able to bypass this filter under certain conditions, such as by taking advantage of an existing vulnerability in a web application.
Internet Explorer 8 beta 2 is vulnerable.
} BODY{a:expression(alert('hi'))};</style>***<style>***