Lucene search

K
mozillaMozilla FoundationMFSA2013-27
HistoryFeb 19, 2013 - 12:00 a.m.

Phishing on HTTPS connection through malicious proxy — Mozilla

2013-02-1900:00:00
Mozilla Foundation
www.mozilla.org
21

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

61.1%

Google security researcher Michal Zalewski reported an issue where the browser displayed the content of a proxy’s 407 response if a user canceled the proxy’s authentication prompt. In this circumstance, the addressbar will continue to show the requested site’s address, including HTTPS addresses that appear to be secure. This spoofing of addresses can be used for phishing attacks by fooling users into entering credentials, for example.

Affected configurations

Vulners
Node
mozillafirefoxRange<19
OR
mozillafirefox_esrRange<17.0.3
OR
mozillaseamonkeyRange<2.16
OR
mozillathunderbirdRange<17.0.3
OR
mozillathunderbird_esrRange<17.0.3

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.002 Low

EPSS

Percentile

61.1%