CVE-2007-3670 (CNNVD-200707-163)
中文标题:
Microsoft Internet Explorer 跨站脚本漏洞
英文标题:
Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefo...
漏洞描述
中文描述:
Microsoft Internet Explorer(IE)是美国微软(Microsoft)公司的一款Windows操作系统附带的Web浏览器。 IE在安装了Firefox的机器上调用特定的协议处理器时存在命令注入漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意命令。 在Windows系统上,如果安装了Firefox的话,Firefox会安装一些Mozilla专用协议(如FirefoxURL和FirefoxHTML)的协议处理器。如果Windows遇到了无法处理的URL协议,就会在Windows注册表中搜索适当的协议处理器,找到了正确的处理器后就会向其传送URL字符串,但没有执行任何过滤。 假设在Windows系统上安装了Firefox且注册了FirefoxURL协议处理器,通常这个协议处理器的的shell open命令如下: [HKEY_CLASSES_ROOTFirefoxURLshellopencommand@] C:\PROGRA~1\MOZILL~2\FIREFOX.EXE -url "%1″ -requestPending 当Internet Explorer遇到了对FirefoxURL URL方案中内容的引用时,会以EXE镜像路径调用ShellExecute,并未经任何输入验证便传送了整个请求URI。以下请求: FirefoxURL://foo" argument "my value 会导致使用以下命令行启动Firefox: "C:PROGRA~1MOZILL~2FIREFOX.EXE" -url "firefoxurl://foo" argument "my value/" requestPending 因此可以对firefox.exe进程指定任意参数,这就等于获得了-chrome命令行参数,因为攻击者可以指定任意Javascript代码,然后以可信任Chrome内容的权限执行。
英文描述:
Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| microsoft | internet_explorer | 6 | - | - |
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
|
| microsoft | internet_explorer | 7.0 | - | - |
cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
|
| mozilla | firefox | * | - | - |
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:N/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-3670 |
2025-11-11 15:17:54 | 2025-11-11 07:32:45 |
| NVD | nvd_CVE-2007-3670 |
2025-11-11 14:52:11 | 2025-11-11 07:41:31 |
| CNNVD | cnnvd_CNNVD-200707-163 |
2025-11-11 15:08:57 | 2025-11-11 07:49:19 |
| EXPLOITDB | exploitdb_EDB-30285 |
2025-11-11 15:05:26 | 2025-11-11 08:25:28 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 39 -> 42
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-200707-163
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 3
- references_count: 41 -> 39
- data_sources: ['cve'] -> ['cve', 'nvd']