CVE-2008-5555
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
12/12/2008
Last modified:
09/04/2025
Description
Microsoft Internet Explorer 8.0 Beta 2 relies on the XDomainRequestAllowed HTTP header to authorize data exchange between domains, which allows remote attackers to bypass the product's XSS Filter protection mechanism, and conduct XSS and cross-domain attacks, by injecting this header after a CRLF sequence, related to "XDomainRequest Allowed Injection (XAI)." NOTE: the vendor has reportedly stated that the XSS Filter intentionally does not attempt to "address every conceivable XSS attack scenario."
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:internet_explorer:8:beta2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47444
- http://www.securityfocus.com/archive/1/499124/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47444



