Vulnerability tracking firm Secunia ranks the flaw, discovered by Israeli researcher Aviv Raff, as "less critical."
Attackers are able to inject script into the "Refresh the page" link that appears on a webpage when navigation to a particular site is cancelled.
Cyberthieves can then lead unsuspecting users to a phishing site.
"The victim will think that there was an error in the site or some kind of network error and will try to refresh the page," Raff said on his website.
"Once he will click on the "Refresh the page" link, the attacker’s provided content (e.g. fake login page) will be displayed and the victim will think that he’s within the trusted site because the address bar shows the trusted site’s URL."
Microsoft is investigating the "possible" vulnerability and was not aware of any customers being affected, a company spokesman told SCMagazine.com in an email.
Raff said the bug could be exploited to launch a phishing attack if the user wants to get to a banking, ecommerce or social networking site, for example. But the flaw likely cannot be taken advantage of to execute remote code, he added.
"To perform a phishing attack, an attacker can create a specially crafted navcancl.htm (which signals a canceled navigation) local resource link that will display fake content of a trusted site," Raff said.
Secunia said in an advisory today that users should only follow links from trusted sources and should not click on the "Refresh the page" link when located on a "Navigation Cancelled" page.
Microsoft Internet Explorer XSS vulnerabilty could attract phishers
By
Dan Kaplan
on
Mar 16, 2007 6:29AM

Microsoft's Internet Explorer 7 (IE7) is vulnerable to cross-site scripting that could allow attackers to spoof a trusted site to launch a phishing attack.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see