Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0347: Internet Explorer 4.01 allows remote attackers to read local files and spoof web pages via a "%01" c

0
High
VulnerabilityCVE-1999-0347cve-1999-0347
Published: Tue Jan 26 1999 (01/26/1999, 05:00:00 UTC)
Source: NVD

Description

Internet Explorer 4.01 allows remote attackers to read local files and spoof web pages via a "%01" character in an "about:" Javascript URL, which causes Internet Explorer to use the domain specified after the character.

AI-Powered Analysis

AILast updated: 06/28/2025, 14:09:30 UTC

Technical Analysis

CVE-1999-0347 is a critical vulnerability affecting Internet Explorer version 4.01, discovered in early 1999. The flaw arises from improper handling of the "%01" character within an "about:" JavaScript URL. Specifically, when this character is included, Internet Explorer misinterprets the domain specified after "%01", allowing a remote attacker to bypass the browser's same-origin policy. This enables the attacker to read local files on the victim's machine and spoof web pages by making them appear as if they originate from a trusted domain. The vulnerability effectively allows unauthorized disclosure of local file contents and manipulation of web content, which can lead to further exploitation such as phishing or injection of malicious scripts. The CVSS v2 base score is 10.0, indicating critical severity, with network attack vector, no authentication required, and complete compromise of confidentiality, integrity, and availability. No patches are available for this vulnerability, and there are no known exploits in the wild documented. Given the age of the vulnerability and the affected software, this issue primarily concerns legacy systems still running Internet Explorer 4.01, which is an extremely outdated browser version.

Potential Impact

For European organizations, the impact of this vulnerability is largely dependent on the presence of legacy systems running Internet Explorer 4.01. If such systems exist, attackers could remotely read sensitive local files, potentially exposing confidential corporate data, credentials, or configuration files. The spoofing capability could facilitate phishing attacks by making malicious web pages appear legitimate, increasing the risk of credential theft or malware infection. This could disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR where data breaches must be reported. However, given the obsolescence of IE 4.01, the practical risk is low for most modern European enterprises. Nonetheless, organizations in sectors with legacy infrastructure—such as industrial control systems, government agencies, or critical infrastructure operators—may face higher risks if these outdated browsers remain in use.

Mitigation Recommendations

Since no official patches are available for this vulnerability, the primary mitigation is to discontinue the use of Internet Explorer 4.01 entirely. Organizations should upgrade to supported, modern browsers that receive regular security updates. For legacy applications that require IE, consider isolating these systems from the internet and sensitive networks using network segmentation and strict firewall rules. Employ endpoint protection solutions that can detect and block suspicious scripts or URL manipulations. Additionally, implement strict content security policies and disable or restrict JavaScript execution in legacy browsers where possible. User education to avoid interacting with suspicious links and URLs is also critical. Regularly audit systems to identify any remaining IE 4.01 installations and remove or upgrade them promptly.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dedaf

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 2:09:30 PM

Last updated: 2/7/2026, 11:43:48 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats