Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-8366: Microsoft Edge Information Disclosure Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2018-8366: Microsoft Edge Information Disclosure Vulnerability

Severity
3
CVSS
(AV:N/AC:H/Au:N/C:P/I:N/A:N)
Published
09/11/2018
Created
03/19/2019
Added
09/11/2018
Modified
11/18/2021

Description

An information disclosure vulnerability exists when the Microsoft Edge Fetch API incorrectly handles a filtered response type. An attacker could use the vulnerability to read the URL of a cross-origin request. Websites that that do not securely populate the URL with confidential information could allow information to be disclosed to an attacker. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website in an attempt to exploit the vulnerability. In addition, the user must be logged on to a website that does not securely populate URLs with confidential information. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince the user to take action. For example, an attacker could trick a user into clicking a link that takes them to the attacker's site. The update addresses the vulnerability by changing how the Fetch API in Microsoft Edge handles specific filtered response types.

Solution(s)

  • msft-kb4457128-92d4e1f4-716c-4d0c-adaf-544d7f4b243d
  • msft-kb4457128-e3bcb87c-3e55-4ed7-8db0-d9598c929a11
  • msft-kb4457128-eab1a4bc-7207-4730-9370-a5869908cd56

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;