CVE-2005-4827

N/A Unknown
Published: December 31, 2005 Modified: April 16, 2026
View on NVD

Description

Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2007/Feb/0081.html
Source: cve@mitre.org
Vendor Advisory
http://seclists.org/fulldisclosure/2007/Feb/0081.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/411585
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/459172/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/14969
Source: af854a3a-2127-422b-91ae-364da2661108

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
18.5%
95th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

microsoft canon