Lucene search

K
mozillaMozilla FoundationMFSA2009-44
HistoryAug 03, 2009 - 12:00 a.m.

Location bar and SSL indicator spoofing via window.open() on invalid URL — Mozilla

2009-08-0300:00:00
Mozilla Foundation
www.mozilla.org
17

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.031 Low

EPSS

Percentile

91.2%

Security researcher Juan Pablo Lopez Yacubian reported that an attacker could call window.open() on an invalid URL which looks similar to a legitimate URL and then use document.write() to place content within the new document, appearing to have come from the spoofed location. Additionally, if the spoofed document was created by a document with a valid SSL certificate, the SSL indicators would be carried over into the spoofed document. An attacker could use these issues to display misleading location and SSL information for a malicious web page.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.13
OR
mozillafirefoxRange<3.5.2
CPENameOperatorVersion
firefoxlt3.0.13
firefoxlt3.5.2

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:P/A:P

0.031 Low

EPSS

Percentile

91.2%