Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-3324 | First vendor Publication | 2010-09-17 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3324 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7297 | |||
Oval ID: | oval:org.mitre.oval:def:7297 | ||
Title: | HTML Sanitization Vulnerability (CVE-2010-3324) | ||
Description: | The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka "HTML Sanitization Vulnerability," a different vulnerability than CVE-2010-1257. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3324 | Version: | 13 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 8 Microsoft Windows SharePoint Services 3.0 Microsoft Office SharePoint Server 2007 Microsoft Office SharePoint Foundation 2010 Microsoft Groove Server 2010 Microsoft Office Web Apps |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2010-10-16 | Microsoft Office HtmlDlgHelper Class Memory Corruption |
OpenVAS Exploits
Date | Description |
---|---|
2011-09-22 | Name : Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048) File : nvt/secpod_ms10-072.nasl |
2010-12-15 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (2416400) File : nvt/secpod_ms10-090.nasl |
2010-10-13 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (2360131) File : nvt/secpod_ms10-071.nasl |
2010-09-23 | Name : Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability File : nvt/secpod_ms_ie_static_html_xss_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
68123 | Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS ... Microsoft SharePoint contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered when the application does not properly sanitise HTML code using SafeHTML. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. |
Snort® IPS/IDS
Date | Description |
---|---|
2018-02-22 | toStaticHTML CSS import XSS exploit attempt RuleID : 45514 - Revision : 1 - Type : BROWSER-IE |
2017-07-11 | Microsoft Internet Explorer CStyleSheetRule array memory corruption attempt RuleID : 43134 - Revision : 1 - Type : BROWSER-IE |
2016-03-14 | Microsoft Internet Explorer Scriptlet Component ActiveX clsid access RuleID : 36772 - Revision : 2 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft HtmlDlgHelper ActiveX clsid access RuleID : 23555 - Revision : 7 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Internet Explorer CStyleSheetRule array memory corruption attempt RuleID : 19436 - Revision : 14 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer Cross-Domain information disclosure attempt RuleID : 19411 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 CSS XSRF exploit attempt RuleID : 17774 - Revision : 8 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer Scriptlet Component ActiveX clsid access RuleID : 17772 - Revision : 15 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer cross-domain information disclosure attempt RuleID : 17771 - Revision : 12 - Type : BROWSER-IE |
2014-01-10 | Microsoft HtmlDlgHelper ActiveX clsid access RuleID : 17770 - Revision : 18 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Internet Explorer 8 CSS invalid mapping exploit attempt RuleID : 17769 - Revision : 13 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 object event handler use after free exploit att... RuleID : 17768 - Revision : 15 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 tostaticHTML CSS import vulnerability RuleID : 17767 - Revision : 15 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 XSS in toStaticHTML API attempt RuleID : 17766 - Revision : 15 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-18 | Name : The remote host is affected by multiple cross-site scripting vulnerabilities. File : safehtml_ms10_072.nasl - Type : ACT_GATHER_INFO |
2010-10-13 | Name : Arbitrary code can be executed on the remote host through a web browser. File : smb_nt_ms10-071.nasl - Type : ACT_GATHER_INFO |
2010-10-13 | Name : The remote host is affected by multiple cross-site scripting vulnerabilities. File : smb_nt_ms10-072.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:32 |
|
2024-11-28 12:22:52 |
|
2021-07-27 00:24:32 |
|
2021-07-24 01:44:09 |
|
2021-07-24 01:07:33 |
|
2021-07-23 21:24:59 |
|
2021-05-04 12:12:22 |
|
2021-04-22 01:13:05 |
|
2020-05-23 00:26:27 |
|
2018-10-13 00:22:59 |
|
2017-09-19 09:23:56 |
|
2016-04-26 20:04:45 |
|
2014-02-17 10:57:19 |
|
2014-01-19 21:27:08 |
|
2013-05-10 23:32:09 |
|