Lucene search

K
mozillaMozilla FoundationMFSA2007-04
HistoryFeb 23, 2007 - 12:00 a.m.

Spoofing using custom cursor and CSS3 hotspot — Mozilla

2007-02-2300:00:00
Mozilla Foundation
www.mozilla.org
15

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.332 Low

EPSS

Percentile

97.0%

David Eckel reported that browser UI elements–such as the host name and security indicators–could be spoofed by using a large, mostly transparent, custom cursor and adjusting the CSS3 hotspot property so that the visible part of the cursor floated outside the browser content area.

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.332 Low

EPSS

Percentile

97.0%