vendor:
Internet Explorer
by:
John Page (aka hyp3rlinx)
7.5
CVSS
HIGH
XML External Entity Injection
611
CWE
Product Name: Internet Explorer
Affected Version From: Microsoft Internet Explorer v11
Affected Version To: Microsoft Internet Explorer v11
Patch Exists: NO
Related CWE: N/A
CPE: a:microsoft:internet_explorer:11
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2021
Microsoft Internet Explorer v11 XML External Entity Injection 0day
Internet Explorer is vulnerable to XML External Entity attack if a user opens a specially crafted .MHT file locally. This can allow remote attackers to potentially exfiltrate Local files and conduct remote reconnaissance on locally installed Program version information. Upon opening the malicious ".MHT" file locally it should launch Internet Explorer. Afterwards, user interactions like duplicate tab "Ctrl+K" and other interactions like right click "Print Preview" or "Print" commands on the web-page may also trigger the XXE vulnerability. However, a simple call to the window.print() Javascript function should do the trick without requiring any user interaction with the webpage.
Mitigation:
Users should avoid opening untrusted .MHT files from untrusted sources.