HTTP: Internet Explorer ftp:// Handler Insecure Script Execution

This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. Because the IE ftp:// handler performs insecure checking, attackers can craft a malicious Web page that executes JavaScript on the client machine when a linked is clicked.

Extended Description

A cross site scripting issue has been reported with some versions of Microsoft Internet Explorer for Windows. Under some configurations, data included within a FTP URL will be rendered as displayed content, allowing the execution of arbitrary JavaScript code within the Local Computer context. If both of the 'Enable folder view for FTP sites' and 'Enable Web content in folders' options are enabled, this vulnerability exists. These options are enabled by default. When a folder is being viewed through FTP, the FTP server name is included in the Web Content information displayed. The FTP server name is not sanitized. A malicious link may define a server name which includes HTML content, including script code. When displayed, this script code will execute within the Local Computer context. This vulnerability has been confirmed to exist under Windows 2000. Other versions of Windows may share this vulnerability. This has not, however, been confirmed.

Affected Products

Microsoft internet_explorer

Short Name
HTTP:STC:IE:IE-FTP-SCRIPTING
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2002-2062 Execution Explorer Handler Insecure Internet Script bid:4954 ftp://
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Microsoft

CVSS Score

4.3

Found a potential security threat?