VYPR
Unrated severityNVD Advisory· Published Jul 7, 2009· Updated Apr 23, 2026

CVE-2009-2350

CVE-2009-2350

Description

Microsoft Internet Explorer 6.0.2900.2180 and earlier does not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header, a related issue to CVE-2009-1312.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Internet Explorer 6 and earlier fail to block javascript: URIs in Refresh headers, enabling cross-site scripting via injected header content.

Vulnerability

Microsoft Internet Explorer 6 version 6.0.2900.2180 and earlier does not block javascript: URIs in the Refresh HTTP response header. This allows a remote attacker to perform cross-site scripting (XSS) attacks by injecting a Refresh header or controlling its content. The vulnerability is related to CVE-2009-1312 and affects IE6 exclusively (IE7 and IE8 are not vulnerable per the reference) [1][2].

Exploitation

The attacker needs to cause a target web server that reflects user input into a Refresh header—or a server that allows injection of response headers—to return a response with a header such as Refresh: 0; URL=javascript:alert(document.cookie). No authentication is required, and no user interaction beyond visiting the attacker-controlled or attacker-influenced page is needed. The attack works via common redirector scripts or any mechanism that produces a Refresh header containing attacker-supplied data [1][2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the security context of the vulnerable web site's origin. This can lead to cookie theft, session hijacking, defacement, or other client-side attacks. The impact is limited to the confidentiality and integrity of the user's session with the affected site [1][2].

Mitigation

Microsoft Internet Explorer 6 is a legacy browser that reached end of life; no official patch was released for this specific vulnerability. Users are strongly advised to upgrade to a modern, supported browser such as Internet Explorer 7, Internet Explorer 8, or a current Edge/Chrome/Firefox release. Server operators should sanitize any user-supplied values placed in HTTP Refresh headers and avoid reflecting unvalidated input [1][2].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.