Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window’s zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the “Travel Log Cross Domain Vulnerability.”
marc.info/?l=bugtraq&m=106979349517578&w=2
marc.info/?l=bugtraq&m=107038202225587&w=2
www.kb.cert.org/vuls/id/784102
www.safecenter.net/UMBRELLAWEBV4/BackToFramedJpu
www.us-cert.gov/cas/techalerts/TA04-033A.html
docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-004
exchange.xforce.ibmcloud.com/vulnerabilities/13846
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A630
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A643
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A687
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A689
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A745
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A774
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A805