Vulnerability CVE-2008-4582


Published: 2008-10-15   Modified: 2012-02-12

Description:
Mozilla Firefox 3.0.1 through 3.0.3, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via an HTML document that is directly accessible through a filesystem, as demonstrated by documents in (1) local folders, (2) Windows share folders, and (3) RAR archives, and as demonstrated by IFRAMEs referencing shortcuts that point to (a) about:cache?device=memory and (b) about:cache?device=disk, a variant of CVE-2008-2810.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Firefox Privacy Broken If Used to Open Web Page File
Liu Die Yu
17.10.2008

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Mozilla -> Firefox 
Mozilla -> Seamonkey 
Debian -> Debian linux 
Canonical -> Ubuntu linux 

 References:
http://liudieyu0.blog124.fc2.com/blog-entry-6.html
http://securityreason.com/securityalert/4416
http://securitytracker.com/alerts/2008/Nov/1021212.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
http://ubuntu.com/usn/usn-667-1
http://www.debian.org/security/2008/dsa-1669
http://www.debian.org/security/2008/dsa-1671
http://www.debian.org/security/2009/dsa-1696
http://www.debian.org/security/2009/dsa-1697
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html
http://www.securityfocus.com/archive/1/497091/100/0/threaded
http://www.securityfocus.com/bid/31611
http://www.securityfocus.com/bid/31747
http://www.securitytracker.com/id?1021190
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
http://www.vupen.com/english/advisories/2008/2818
http://www.vupen.com/english/advisories/2009/0977
https://bugzilla.mozilla.org/show_bug.cgi?id=455311
https://exchange.xforce.ibmcloud.com/vulnerabilities/45740
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html

Copyright 2024, cxsecurity.com

 

Back to Top