Lucene search

K
mozillaMozilla FoundationMFSA2008-67
HistoryDec 16, 2008 - 12:00 a.m.

Escaped null characters ignored by CSS parser — Mozilla

2008-12-1600:00:00
Mozilla Foundation
www.mozilla.org
23

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

76.8%

Kojima Hajime reported that unlike literal null characters which were handled correctly, the escaped form ‘\0’ was ignored by the CSS parser and treated as if it was not present in the CSS input string. This issue could potentially be used to bypass script sanitization routines in web applications. The severity of this issue was determined to be low.

Affected configurations

Vulners
Node
mozillafirefoxRange<2.0.0.19
OR
mozillafirefoxRange<3.0.5
OR
mozillaseamonkeyRange<1.1.14
OR
mozillathunderbirdRange<2.0.0.19
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.005

Percentile

76.8%