Lucene search

K
mozillaMozilla FoundationMFSA2009-26
HistoryJun 11, 2009 - 12:00 a.m.

Arbitrary domain cookie access by local file: resources — Mozilla

2009-06-1100:00:00
Mozilla Foundation
www.mozilla.org
24

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.006

Percentile

79.5%

Security researcher Gregory Fleischer reported that local resources loaded via the file: protocol can access any domain’s cookies which have been saved on a user’s machine. Fleischer demonstrated that a local document’s domain was being calculated incorrectly from its URL. If a victim could be persuaded to download a malicious file and then open that file in their browser, the malicious file could then steal arbitrary cookies from the victim’s computer. Due to the interaction required for this attack, the severity of the issue was determined to be moderate.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.11
OR
mozillaseamonkeyRange<1.1.17

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.006

Percentile

79.5%