发布时间 :2001-02-16 00:00:00
修订时间 :2017-10-09 21:29:35

[原文]The ActiveX control for invoking a scriptlet in Internet Explorer 5.0 through 5.5 renders arbitrary file types instead of HTML, which allows an attacker to read arbitrary files, aka a variant of the "Scriptlet Rendering" vulnerability.

[CNNVD]Internet Explorer漏洞(CNNVD-200102-087)

        Internet Explorer 5.0到5.5版本的调用脚本小程序的控制项打底任意文件类型代替HTML。攻击者读取任意文件,也称为“脚本小程序打底漏洞”变体。

- CVSS (基础分值)

CVSS分值: 2.6 [轻微(LOW)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:ie:4.0Microsoft Internet Explorer 4.0
cpe:/a:microsoft:ie:5.0Microsoft Internet Explorer 5.0
cpe:/a:microsoft:ie:5.01Microsoft Internet Explorer 5.01
cpe:/a:microsoft:ie:5.5Microsoft ie 5.5

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  ie-scriptlet-rendering-read-files(6085)

- 漏洞信息

Internet Explorer漏洞
低危 未知
2001-02-16 00:00:00 2005-10-12 00:00:00
        Internet Explorer 5.0到5.5版本的调用脚本小程序的控制项打底任意文件类型代替HTML。攻击者读取任意文件,也称为“脚本小程序打底漏洞”变体。

- 公告与补丁


- 漏洞信息

Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
Remote / Network Access, Context Dependent Information Disclosure, Input Manipulation
Loss of Confidentiality
Exploit Unknown

- 漏洞描述

Microsoft Internet Explorer contains a flaw that may lead to an unauthorized information disclosure. The ActiveX control used for invoking scriptlets can be used to render arbitrary file types instead of strictly HTML files, which could allow a malicious web site operator to create a script that would access arbitrary files on the victim's system resulting in a loss of confidentiality.

- 时间线

2000-12-01 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者