Lucene search

K
mozillaMozilla FoundationMFSA2006-36
HistoryJun 01, 2006 - 12:00 a.m.

PLUGINSPAGE privileged JavaScript execution II — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
16

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.198

Percentile

96.3%

Paul Nickerson reports that the fix for MFSA 2005-34 can be bypassed using nested javascript: URLs, again allowing the attacker to execute privileged code. The attacker must first convince the user to first click on the missing-plugin icon in the page or the “Install Missing Plugins…” button in the infobar, and then click on the “Manual Install” button on the plugin-finder dialog.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.198

Percentile

96.3%