vendor:
Outlook Express
by:
SecurityFocus
7.5
CVSS
HIGH
MHTML URL Handler
N/A
CWE
Product Name: Outlook Express
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002
Microsoft Outlook Express MHTML URL Handler Vulnerability
Microsoft Outlook Express introduced a URL handler called MHTML (MIME Encapsulation of Aggregate HTML). This allows Internet Explorer to pass MHTML files to Outlook Express for rendering. The MHTML URL handler does not validate the file type it is rendering. This could allow a file type that is normally considered to be a 'safe file type', such as a .txt file, to be opened and have any script contained within rendered. This script would then be rendered in the Local Computer Zone.
Mitigation:
Validate the file type before rendering it.