CVE-2003-0309

Internet Explorer 5.01-6.0 - CSRF

Title source: llm
STIX 2.1

Description

Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to bypass security zone restrictions and execute arbitrary programs via a web document with a large number of duplicate file:// or other requests that point to the program and open multiple file download dialogs, which eventually cause Internet Explorer to execute the program, as demonstrated using a large number of FRAME or IFRAME tags, aka the "File Download Dialog Vulnerability."

Exploits (1)

exploitdb WORKING POC VERIFIED
by Marek Bialoglowy · textremotewindows
https://www.exploit-db.com/exploits/22575

References (9)

Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A948
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/12019
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=105249399103214&w=2
US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/251788
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/8807
Mailing List mailing-list x_refsource_ntbugtraq
http://marc.info/?l=ntbugtraq&m=105294162726096&w=2
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/7539
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=105294081325040&w=2

Scores

EPSS 0.1916
EPSS Percentile 95.4%

Details

Status published
Products (1)
microsoft/internet_explorer 6.0.2800
Published Jun 09, 2003
Tracked Since Feb 18, 2026