Lucene search

K
mozillaMozilla FoundationMFSA2006-12
HistoryApr 13, 2006 - 12:00 a.m.

Secure-site spoof (requires security warning dialog) — Mozilla

2006-04-1300:00:00
Mozilla Foundation
www.mozilla.org
13

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.123

Percentile

95.4%

Tristor reports that it was possible to spoof the browser’s secure-site indicators (the lock icon, the site name in the URL field, the gold URL field background in Firefox) by first loading the target secure site in a pop-up window, then changing its location to a different site.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.0.8
OR
mozillafirefoxRange<1.5
OR
mozillamozilla_suiteRange<1.7.13
OR
mozillaseamonkeyRange<1
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillamozilla_suite*cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.123

Percentile

95.4%