Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2007-02-07T20:00:00

Updated: 2018-10-19T14:57:01

Reserved: 2007-02-07T00:00:00


Link: CVE-2005-4827

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2005-12-31T05:00:00.000

Modified: 2021-07-23T15:04:41.580


Link: CVE-2005-4827

JSON object: View

cve-icon Redhat Information

No data.