Description
Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:01:23.269Z
Reserved: 2007-02-07T00:00:00.000Z
Link: CVE-2005-4827
No data.
Status : Modified
Published: 2005-12-31T05:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-4827
No data.
OpenCVE Enrichment
No data.
Weaknesses