Lucene search

K
mozillaMozilla FoundationMFSA2009-62
HistoryOct 27, 2009 - 12:00 a.m.

Download filename spoofing with RTL override β€” Mozilla

2009-10-2700:00:00
Mozilla Foundation
www.mozilla.org
23

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%

Mozilla security researchers Jesse Ruderman and Sid Stamm reported that when downloading a file containing a right-to-left override character (RTL) in the filename, the name displayed in the dialog title bar conflicts with the name of the file shown in the dialog body. An attacker could use this vulnerability to obfuscate the name and file extension of a file to be downloaded and opened, potentially causing a user to run an executable file when they expected to open a non-executable file.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.15
OR
mozillafirefoxRange<3.5.4
OR
mozillaseamonkeyRange<2
CPENameOperatorVersion
firefoxlt3.0.15
firefoxlt3.5.4
seamonkeylt2

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%