Microsoft XML Core Services Information Disclosure

Strike ID:
E17-0bae1
CVSS:
4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
False Positive:
f
Variants:
12
Year:
2017

Description

This strike exploits a vulnerability that exists in Microsoft XML Core Services. Specifically, if the loadXML function is used to reference a portable executable with the res protocol in its URI, the parseError method can return a message up the stack that can be used to identify whether or not the file exists. An attacker can use this method to disclose which portable executables exist on the target's system.

CVE

Bid