[] NeoSense

Microsoft Internet Explorer 8 - CSS 'expression' Property Cross-Site Scripting Filter Bypass

Author: Rafel Ivgi
type: remote
platform: windows
port: 
date_added: 2008-12-11 
date_updated: 2014-04-02 
verified: 1 
codes: CVE-2008-5551;OSVDB-57062 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/32780/info

Microsoft Internet Explorer is a web browser for the Microsoft Windows operating system.

Internet Explorer 8 includes a cross-site-scripting filter that is designed to prevent cross-site-scripting attacks against vulnerable web applications. Attackers may be able to bypass this filter under certain conditions, such as by taking advantage of an existing vulnerability in a web application.

Internet Explorer 8 beta 2 is vulnerable.

} BODY{a:expression(alert(&#039;hi&#039;))};</style>***<style>***