Lucene search

K
freebsdFreeBSDCE6AC624-AEC8-11D9-A788-0001020EED82
HistoryMar 31, 2005 - 12:00 a.m.

firefox -- PLUGINSPAGE privileged javascript execution

2005-03-3100:00:00
vuxml.freebsd.org
23

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.627

Percentile

97.8%

A Mozilla Foundation Security Advisory reports:

When a webpage requires a plugin that is not installed
the user can click to launch the Plugin Finder Service
(PFS) to find an appropriate plugin. If the service does
not have an appropriate plugin the EMBED tag is checked
for a PLUGINSPAGE attribute, and if one is found the PFS
dialog will contain a “manual install” button that will
load the PLUGINSPAGE url.
Omar Khan reported that if the PLUGINSPAGE attribute
contains a javascript: url then pressing the button could
launch arbitrary code capable of stealing local data or
installing malicious code.
Doron Rosenberg reported a variant that injects script by
appending it to a malformed URL of any protocol.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfirefox< 1.0.3,1UNKNOWN
FreeBSDanynoarchlinux-firefox< 1.0.3UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.627

Percentile

97.8%