Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE network
low complexity
microsoft
critical
exploit available
Published: 2004-08-06
Updated: 2021-07-23
Summary
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.
Vulnerable Configurations
Part | Description | Count |
Application | Microsoft | 4 |
Exploit-Db
description | MS Internet Explorer Remote Wscript.Shell Exploit. CVE-2004-0549. Remote exploit for windows platform |
id | EDB-ID:316 |
last seen | 2016-01-31 |
modified | 2004-07-13 |
published | 2004-07-13 |
reporter | Ferruh Mavituna |
source | https://www.exploit-db.com/download/316/ |
title | Microsoft Internet Explorer Remote Wscript.Shell Exploit |
Oval
accepted | 2014-02-24T04:00:08.969-05:00 |
class | vulnerability |
contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
|
description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. |
family | windows |
id | oval:org.mitre.oval:def:1133 |
status | accepted |
submitted | 2004-07-30T12:00:00.000-04:00 |
title | Scob and Toofer Internet Explorer v6.0,SP1 Vulnerabilities |
version | 68 |
accepted | 2014-02-24T04:00:31.742-05:00 |
class | vulnerability |
contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Harvey Rubinovitz | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
|
description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. |
family | windows |
id | oval:org.mitre.oval:def:207 |
status | accepted |
submitted | 2004-07-30T12:00:00.000-04:00 |
title | Scob and Toofer Internet Explorer v6.0,SP1 for Server 2003 Vulnerabilities |
version | 69 |
accepted | 2014-02-24T04:03:12.690-05:00 |
class | vulnerability |
contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
|
description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. |
family | windows |
id | oval:org.mitre.oval:def:241 |
status | accepted |
submitted | 2004-07-30T12:00:00.000-04:00 |
title | Scob and Toofer Internet Explorer v5.5,SP2 Vulnerabilities |
version | 66 |
accepted | 2014-02-24T04:03:21.607-05:00 |
class | vulnerability |
contributors | name | Tiffany Bergeron | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Christine Walzer | organization | The MITRE Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
|
description | The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. |
family | windows |
id | oval:org.mitre.oval:def:519 |
status | accepted |
submitted | 2004-07-30T04:00:00.000-04:00 |
title | Scob and Toofer Internet Explorer v6.0 Vulnerabilities |
version | 67 |