Lucene search

K
mozillaMozilla FoundationMFSA2009-03
HistoryFeb 03, 2009 - 12:00 a.m.

Local file stealing with SessionStore — Mozilla

2009-02-0300:00:00
Mozilla Foundation
www.mozilla.org
10

5.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:C/I:N/A:N

0.005 Low

EPSS

Percentile

77.0%

Mozilla security researcher moz_bug_r_a4 reported that a form input control’s type could be changed during the restoration of a closed tab. An attacker could set an input control’s text value to the path of a local file whose location was known to the attacker. If the tab was then closed and the victim persuaded to re-open it, upon restoring the tab the attacker could use this vulnerability to change the input type to file. Scripts in the page could then automatically submit the form and steal the contents of the user’s local file.

CPENameOperatorVersion
firefoxlt3.0.6

5.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:C/I:N/A:N

0.005 Low

EPSS

Percentile

77.0%