9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.965 High
EPSS
Percentile
99.6%
Mozilla Firefox does not filter input when sending certain URIs to registered protocol handlers. This may allow a remote, authenticated attacker to use Firefox as a vector for executing commands on a vulnerable system.
A Uniform Resource Identifier (URI) is a string of characters that can be used to identify a location, resource, or protocol. Mozilla Firefox will rely on Microsoft Windows to determine the appropriate protocol handler for certain URIs that it does not handle internally.
Firefox does not filter data passed to certain URI protocol handlers. This allows Firefox to be used as an attack vector for vulnerabilities in other applications. For example, Firefox can be used as an attack vector for the vulnerability in how Microsoft Windows itself determines the appropriate protocol handler [VU#403150]. Public exploit code for this vulnerability exists, which uses mailto
, news
, nntp
, snews
, and telnet
URI handlers.
Note this vulnerability is only present in the Windows version of Firefox.
A remote, unauthenticated attacker may be able to execute arbitrary commands, using Firefox as an attack vector.
Mozilla has addressed this issue in Firefox 2.0.0.6.
Workarounds for users
Using the about:config interface, setting the following options to **true**
will make Firefox display a prompt before sending a URI to an external handler.
network.protocol-handler.warn-external-default
network.protocol-handler.warn-external.mailto
network.protocol-handler.warn-external.news
network.protocol-handler.warn-external.nntp
network.protocol-handler.warn-external.snews
Workarounds for administrators
Blocking mailto:%00
, nntp:%00
, news:%00
, snews:%00
, telnet:%00
strings inside of HTML pages or other network streams using an application layer firewall or IPS may mitigate this vulnerability. See the xs-sniper blog for more information about known vulnerable URIs. Please note that these filters may only work for the public exploit code that is currently available. Other variations of the exploit code can bypass these restrictions.
783400
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 26, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <https://bugzilla.mozilla.org/show_bug.cgi?id=389580> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23783400 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was disclosed by Billy (BK) Rios.
This document was written by Ryan Giobbi, Jeff Gennari, and Will Dormann…
CVE IDs: | CVE-2007-3845 |
---|---|
Severity Metric: | 25.52 Date Public: |
en-us.www.mozilla.com/en-US/firefox/2.0.0.6/releasenotes/
en.wikipedia.org/wiki/Uniform_Resource_Identifier
kb.mozillazine.org/Firefox_:_FAQs_:_About:config_Entries
secunia.com/advisories/26201/
support.microsoft.com/kb/224816
www.w3schools.com/tags/ref_urlencode.asp
xs-sniper.com/blog/2007/07/24/remote-command-execution-in-firefox-2005/
xs-sniper.com/blog/remote-command-exec-firefox-2005/
bugzilla.mozilla.org/show_bug.cgi?id=389106
bugzilla.mozilla.org/show_bug.cgi?id=389580