Lucene search

K
mozillaMozilla FoundationMFSA2010-45
HistoryJul 20, 2010 - 12:00 a.m.

Multiple location bar spoofing vulnerabilities — Mozilla

2010-07-2000:00:00
Mozilla Foundation
www.mozilla.org
5

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.202 Low

EPSS

Percentile

96.3%

Google security researcher Michal Zalewski reported two methods for spoofing the contents of the location bar. The first method works by opening a new window containing a resource that responds with an HTTP 204 (no content) and then using the reference to the new window to insert HTML content into the blank document. The second location bar spoofing method does not require that the resource opened in a new window respond with 204, as long as the opener calls window.stop() before the document is loaded. In either case a user could be mislead as to the correct location of the document they are currently viewing.

CPENameOperatorVersion
firefoxlt3.5.11
firefoxlt3.6.7
seamonkeylt2.0.6

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.202 Low

EPSS

Percentile

96.3%