Vulnerability Note VU#883091

Microsoft Internet Information Server (IIS) contains cross-site scripting vulnerability in IIS Help Files search facility

Original Release date: 10 Apr 2002 | Last revised: 10 Apr 2002


Visitors to web sites that use Microsoft IIS 5.0 and 5.1 are vulnerable to cross-site scripting attacks through the IIS help facility.


Cross-site scripting is a form of attack in which an intruder leverages the trust between a victim and a web-site the victim trusts. Quoting from CERT Advisory CA-2001-02:

    Many Internet web sites overlook the possibility that a client may send malicious data intended to be used only by itself. This is an easy mistake to make. After all, why would a user enter malicious code that only the user will see?

    However, this situation may occur when the client relies on an untrustworthy source of information when submitting a request. For example, an attacker may construct a malicious link such as

    <A HREF=" mycomment=<SCRIPT>malicious code</SCRIPT>"> Click here</A>

    When an unsuspecting user clicks on this link, the URL sent to includes the malicious code. If the web server sends a page back to the user including the value of mycomment, the malicious code may be executed unexpectedly on the client.
    This example also applies to untrusted links followed in email or newsgroup messages.

    Abuse of other tags

    In addition to scripting tags, other HTML tags such as the <FORM> tag have the potential to be abused by an attacker. For example, by embedding malicious <FORM> tags at the right place, an intruder can trick users into revealing sensitive information by modifying the behavior of an existing form. Other HTML tags can also be abused to alter the appearance of the page, insert unwanted or offensive images or sounds, or otherwise interfere with the intended appearance and behavior of the page.

In this case, a search of the IIS help facilities returns unsanitized derived from the URL in the resulting page. If an intruder convinces a victim to follow a link with malicious content in it, he can cause the web server to return a page largely under the control of the intruder. If the victim trusts the web site (specifically if Javascript or other script from that site is permitted to run) the intruder can execute arbitrary script as if it came from the web site.

For more information, see Microsoft Security Bulletin MS02-018.

IIS is a very popular web server, and any client that has a trust relationship with an IIS web site may be vulnerable if that site default error messages.


For a description of the potential impact, see .


For a description of the range of solutions to this problem, see In this instance, web site managers should apply a patch as described in MS02-018.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MicrosoftAffected-10 Apr 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Our thanks to Microsoft Corporation, who described this instance of cross-site scripting problems in MS02-018.

This document was written by Shawn V. Hernan.

Other Information

  • CVE IDs: CAN-2002-0074
  • Date Public: 10 Apr 2002
  • Date First Published: 10 Apr 2002
  • Date Last Updated: 10 Apr 2002
  • Severity Metric: 15.95
  • Document Revision: 2


If you have feedback, comments, or additional information about this vulnerability, please send us email.