Vulnerability tracking firm Secunia ranks the flaw, discovered by Israeli researcher Aviv Raff, as "less critical."
Attackers are able to inject script into the "Refresh the page" link that appears on a webpage when navigation to a particular site is cancelled.
Cyberthieves can then lead unsuspecting users to a phishing site.
"The victim will think that there was an error in the site or some kind of network error and will try to refresh the page," Raff said on his website.
"Once he will click on the "Refresh the page" link, the attacker’s provided content (e.g. fake login page) will be displayed and the victim will think that he’s within the trusted site because the address bar shows the trusted site’s URL."
Microsoft is investigating the "possible" vulnerability and was not aware of any customers being affected, a company spokesman told SCMagazine.com in an email.
Raff said the bug could be exploited to launch a phishing attack if the user wants to get to a banking, ecommerce or social networking site, for example. But the flaw likely cannot be taken advantage of to execute remote code, he added.
"To perform a phishing attack, an attacker can create a specially crafted navcancl.htm (which signals a canceled navigation) local resource link that will display fake content of a trusted site," Raff said.
Secunia said in an advisory today that users should only follow links from trusted sources and should not click on the "Refresh the page" link when located on a "Navigation Cancelled" page.
Microsoft Internet Explorer XSS vulnerabilty could attract phishers
By Dan Kaplan on Mar 16, 2007 6:29AM
Microsoft's Internet Explorer 7 (IE7) is vulnerable to cross-site scripting that could allow attackers to spoof a trusted site to launch a phishing attack.
Got a news tip for our journalists? Share it with us anonymously here.