发布时间 :2005-05-02 00:00:00
修订时间 :2008-09-05 16:47:25

[原文]Microsoft Office InfoPath 2003 SP1 includes sensitive information in the Manifest.xsf file in a custom .xsn form, which allows attackers to obtain printer and network information, obtain the database name, username, and password, or obtain the internal web server name.

[CNNVD]Microsoft InfoPath 2003不安全信息存储漏洞(CNNVD-200505-668)

        Microsoft Office InfoPath 2003 SP1在定制的.xsn 表单内的Manifest.xsf文件中包含敏感信息,攻击者可以获取打印机和网络信息、获取数据库名、用户名和密码或内部web服务器名。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  12824

- 漏洞信息

Microsoft InfoPath 2003不安全信息存储漏洞
中危 设计错误
2005-05-02 00:00:00 2005-10-20 00:00:00
        Microsoft Office InfoPath 2003 SP1在定制的.xsn 表单内的Manifest.xsf文件中包含敏感信息,攻击者可以获取打印机和网络信息、获取数据库名、用户名和密码或内部web服务器名。

- 公告与补丁


- 漏洞信息

Microsoft Office InfoPath Manifest.xsf Information Disclosure
Information Disclosure
Loss of Confidentiality

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft InfoPath 2003 Insecure Information Storage Vulnerability
Design Error 12824
No Yes
2005-03-16 12:00:00 2009-07-12 10:56:00
The discoverer of this vulnerability wishes to remain anonymous.

- 受影响的程序版本

Microsoft InfoPath 2003 SP1
+ Microsoft Office 2003 SP1
Microsoft InfoPath 2003
+ Microsoft Office 2003 0

- 漏洞讨论

Microsoft InfoPath is reported prone to an insecure data storage vulnerability. It is reported that the issue manifests when functionality that was introduced with service pack one is employed.

An attacker that can access the 'Manifest.xsf' file may employ stored data to aid in further attacks.

- 漏洞利用

No exploit is required.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考