Mozilla Firefox JavaScript Prompt Spoofing Weakness
2009-12-09T00:00:00
ID SECURITYVULNS:DOC:22877 Type securityvulns Reporter Securityvulns Modified 2009-12-09T00:00:00
Description
There exist two seperate security issues in Mozilla Firefox concerning
JavaScript prompts appearing from domain which is not the true origin.
The first is about spawning JavaScript prompted message over web page of
another domain, so in effect, the address bar and the browser content
are from one domain, but the prompted JavaScript message is generated by
script from another different domain. This is resulted from a race
condition scenario, in which the browser is first navigated to URL of
another domain, then before it's loaded, immediately launch JavaScript
message prompting, so JavaScript message is displayed over a web page
other than its origin web page. The issue here only affects Firefox, and
doesn't seem to affect Internet Explorer and Google Chrome. This is
CVE-2009-4129. The second is regarding the function named
"MakeScriptDialogTitle"(in file "nsGlobalWindow.cpp" of Firefox source
code), responsible for "Script Dialog Title", which is designed to show
"host". The "MakeScriptDialogTitle" function removes usernames and
passwords from URL, with a purpose of "spoof prevention", but it's not
enough, because script dialog has limited and predictable width, so only
the prefix will be displayed if domain name is long. This is
CVE-2009-4130. Topsec has the credit.
{"id": "SECURITYVULNS:DOC:22877", "bulletinFamily": "software", "title": "Mozilla Firefox JavaScript Prompt Spoofing Weakness", "description": "There exist two seperate security issues in Mozilla Firefox concerning \r\nJavaScript prompts appearing from domain which is not the true origin. \r\nThe first is about spawning JavaScript prompted message over web page of \r\nanother domain, so in effect, the address bar and the browser content \r\nare from one domain, but the prompted JavaScript message is generated by \r\nscript from another different domain. This is resulted from a race \r\ncondition scenario, in which the browser is first navigated to URL of \r\nanother domain, then before it's loaded, immediately launch JavaScript \r\nmessage prompting, so JavaScript message is displayed over a web page \r\nother than its origin web page. The issue here only affects Firefox, and \r\ndoesn't seem to affect Internet Explorer and Google Chrome. This is \r\nCVE-2009-4129. The second is regarding the function named \r\n"MakeScriptDialogTitle"(in file "nsGlobalWindow.cpp" of Firefox source \r\ncode), responsible for "Script Dialog Title", which is designed to show \r\n"host". The "MakeScriptDialogTitle" function removes usernames and \r\npasswords from URL, with a purpose of "spoof prevention", but it's not \r\nenough, because script dialog has limited and predictable width, so only \r\nthe prefix will be displayed if domain name is long. This is \r\nCVE-2009-4130. Topsec has the credit.", "published": "2009-12-09T00:00:00", "modified": "2009-12-09T00:00:00", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:22877", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:32", "edition": 1, "viewCount": 2, "enchantments": {"score": {"value": 4.9, "vector": "NONE", "modified": "2018-08-31T11:10:32", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-4129", "CVE-2009-4130"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310801093", "OPENVAS:801093", "OPENVAS:801094", "OPENVAS:1361412562310801094"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:10449"]}], "modified": "2018-08-31T11:10:32", "rev": 2}, "vulnersScore": 4.9}, "affectedSoftware": []}
{"cve": [{"lastseen": "2021-02-02T05:40:07", "description": "Race condition in Mozilla Firefox allows remote attackers to produce a JavaScript message with a spoofed domain association by writing the message in between the document request and document load for a web page in a different domain.", "edition": 4, "cvss3": {}, "published": "2009-12-14T17:30:00", "title": "CVE-2009-4129", "type": "cve", "cwe": ["CWE-362"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4129"], "modified": "2017-08-17T01:31:00", "cpe": ["cpe:/a:mozilla:firefox:*"], "id": "CVE-2009-4129", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4129", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T05:40:07", "description": "Visual truncation vulnerability in the MakeScriptDialogTitle function in nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the origin domain name of a script via a long name.", "edition": 4, "cvss3": {}, "published": "2009-12-14T17:30:00", "title": "CVE-2009-4130", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 5.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-4130"], "modified": "2017-08-17T01:31:00", "cpe": ["cpe:/a:mozilla:firefox:*"], "id": "CVE-2009-4130", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4130", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}, "cpe23": ["cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-04-29T22:26:36", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "description": "The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.", "modified": "2020-04-27T00:00:00", "published": "2009-12-17T00:00:00", "id": "OPENVAS:1361412562310801094", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801094", "type": "openvas", "title": "Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801094\");\n script_version(\"2020-04-27T09:00:11+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-27 09:00:11 +0000 (Mon, 27 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-12-17 08:14:37 +0100 (Thu, 17 Dec 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2009-4129\", \"CVE-2009-4130\");\n script_bugtraq_id(37230, 37232);\n script_name(\"Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54612\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54611\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/alerts/2009/Dec/1023287.html\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_mandatory_keys(\"Firefox/Linux/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to conduct spoofing attacks and\n possibly launch further attacks on the system.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox version 3.0 to 3.5.5 on Linux.\");\n script_tag(name:\"insight\", value:\"- A race condition error allows attackers to produce a JavaScript message with\n a spoofed domain association by writing the message in between the document\n request and document load for a web page in a different domain.\n\n - Visual truncation vulnerability in the MakeScriptDialogTitle function in\n nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the\n origin domain name of a script via a long name.\");\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.6.3 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.mozilla.com/en-US/firefox/firefox.html\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer){\n exit(0);\n}\n\nif(version_in_range(version:ffVer, test_version:\"3.0\", test_version2:\"3.5.5\")){\n report = report_fixed_ver(installed_version:ffVer, vulnerable_range:\"3.0 - 3.5.5\");\n security_message(port: 0, data: report);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2020-04-29T22:26:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "description": "The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.", "modified": "2020-04-27T00:00:00", "published": "2009-12-17T00:00:00", "id": "OPENVAS:1361412562310801093", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310801093", "type": "openvas", "title": "Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.801093\");\n script_version(\"2020-04-27T09:00:11+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-27 09:00:11 +0000 (Mon, 27 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2009-12-17 08:14:37 +0100 (Thu, 17 Dec 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2009-4129\", \"CVE-2009-4130\");\n script_bugtraq_id(37230, 37232);\n script_name(\"Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54612\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/54611\");\n script_xref(name:\"URL\", value:\"http://securitytracker.com/alerts/2009/Dec/1023287.html\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_portable_win.nasl\");\n script_mandatory_keys(\"Firefox/Win/Ver\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to conduct spoofing attacks and\n possibly launch further attacks on the system.\");\n script_tag(name:\"affected\", value:\"Mozilla Firefox version 3.0 to 3.5.5 on Windows.\");\n script_tag(name:\"insight\", value:\"- A race condition error allows attackers to produce a JavaScript message with\n a spoofed domain association by writing the message in between the document\n request and document load for a web page in a different domain.\n\n - Visual truncation vulnerability in the MakeScriptDialogTitle function in\n nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the\n origin domain name of a script via a long name.\");\n script_tag(name:\"solution\", value:\"Upgrade to Firefox version 3.6.3 or later.\");\n script_tag(name:\"summary\", value:\"The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.mozilla.com/en-US/firefox/firefox.html\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\nif(version_in_range(version:ffVer, test_version:\"3.0\", test_version2:\"3.5.5\")){\n report = report_fixed_ver(installed_version:ffVer, vulnerable_range:\"3.0 - 3.5.5\");\n security_message(port: 0, data: report);\n}\n", "cvss": {"score": 5.8, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:P"}}, {"lastseen": "2017-07-02T21:13:54", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "description": "The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.", "modified": "2016-12-28T00:00:00", "published": "2009-12-17T00:00:00", "id": "OPENVAS:801094", "href": "http://plugins.openvas.org/nasl.php?oid=801094", "type": "openvas", "title": "Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_spoof_vuln_lin_dec09.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to conduct spoofing attacks and\n possibly launch further attacks on the system.\n Impact Level:System/Application\";\ntag_affected = \"Mozilla Firefox version 3.0 to 3.5.5 on Linux.\";\ntag_insight = \"- A race condition error allows attackers to produce a JavaScript message with\n a spoofed domain association by writing the message in between the document\n request and document load for a web page in a different domain.\n - Visual truncation vulnerability in the MakeScriptDialogTitle function in\n nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the\n origin domain name of a script via a long name.\";\ntag_solution = \"Upgrade to Firefox version 3.6.3 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/firefox.html\";\ntag_summary = \"The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.\";\n\nif(description)\n{\n script_id(801094);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-17 08:14:37 +0100 (Thu, 17 Dec 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2009-4129\", \"CVE-2009-4130\");\n script_bugtraq_id(37230, 37232);\n script_name(\"Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/54612\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/54611\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/alerts/2009/Dec/1023287.html\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_lin.nasl\");\n script_require_keys(\"Firefox/Linux/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Linux/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Grep for Firefox version 3.0 to 3.5.5\nif(version_in_range(version:ffVer, test_version:\"3.0\", test_version2:\"3.5.5\")){\n security_message(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-02T21:14:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "description": "The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.", "modified": "2016-12-28T00:00:00", "published": "2009-12-17T00:00:00", "id": "OPENVAS:801093", "href": "http://plugins.openvas.org/nasl.php?oid=801093", "type": "openvas", "title": "Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_firefox_mult_spoof_vuln_win_dec09.nasl 4865 2016-12-28 16:16:43Z teissa $\n#\n# Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow attackers to conduct spoofing attacks and\n possibly launch further attacks on the system.\n Impact Level: System/Application.\";\ntag_affected = \"Mozilla Firefox version 3.0 to 3.5.5 on Windows.\";\ntag_insight = \"- A race condition error allows attackers to produce a JavaScript message with\n a spoofed domain association by writing the message in between the document\n request and document load for a web page in a different domain.\n - Visual truncation vulnerability in the MakeScriptDialogTitle function in\n nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the\n origin domain name of a script via a long name.\";\ntag_solution = \"Upgrade to Firefox version 3.6.3 or later,\n For updates refer to http://www.mozilla.com/en-US/firefox/firefox.html\";\ntag_summary = \"The host is installed with Firefox browser and is prone to multiple\n spoofing vulnerabilies.\";\n\nif(description)\n{\n script_id(801093);\n script_version(\"$Revision: 4865 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-12-28 17:16:43 +0100 (Wed, 28 Dec 2016) $\");\n script_tag(name:\"creation_date\", value:\"2009-12-17 08:14:37 +0100 (Thu, 17 Dec 2009)\");\n script_tag(name:\"cvss_base\", value:\"5.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:P\");\n script_cve_id(\"CVE-2009-4129\", \"CVE-2009-4130\");\n script_bugtraq_id(37230, 37232);\n script_name(\"Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Windows)\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/54612\");\n script_xref(name : \"URL\" , value : \"http://xforce.iss.net/xforce/xfdb/54611\");\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/alerts/2009/Dec/1023287.html\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_firefox_detect_win.nasl\");\n script_require_keys(\"Firefox/Win/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\nffVer = get_kb_item(\"Firefox/Win/Ver\");\nif(!ffVer){\n exit(0);\n}\n\n# Grep for Firefox version 3.0 to 3.5.5\nif(version_in_range(version:ffVer, test_version:\"3.0\", test_version2:\"3.5.5\")){\n security_message(0);\n}\n", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:34", "bulletinFamily": "software", "cvelist": ["CVE-2009-4130", "CVE-2009-4129"], "description": "It's possible to spoof form URL.", "edition": 1, "modified": "2009-12-09T00:00:00", "published": "2009-12-09T00:00:00", "id": "SECURITYVULNS:VULN:10449", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:10449", "title": "Mozilla Firefox dialog spoofing", "type": "securityvulns", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:PARTIAL/"}}]}