Lucene search

K
mozillaMozilla FoundationMFSA2006-39
HistoryJun 01, 2006 - 12:00 a.m.

"View Image" local resource linking (Windows) — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
16

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

5.6

Confidence

Low

EPSS

0.01

Percentile

83.6%

Normally Mozilla-based clients prevent web content from linking to local files but Eric Foley reports a partial bypass of this restriction by using Windows filename syntax (on a Windows computer) rather than a file:/// URL as the SRC= attribute. The image will not be loaded on the web page–it will appear as a broken image–but if a user can be convinced to right-click and select “View Image” then the content will be loaded. Since the image will replace the current document attacker script cannot be run on it. Loading a local file at a known location is about the extent of this attack.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
OR
mozillaseamonkeyRange<1.0.2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

5.6

Confidence

Low

EPSS

0.01

Percentile

83.6%