Lucene search

K
mozillaMozilla FoundationMFSA2010-20
HistoryMar 30, 2010 - 12:00 a.m.

Chrome privilege escalation via forced URL drag and drop — Mozilla

2010-03-3000:00:00
Mozilla Foundation
www.mozilla.org
21

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.022

Percentile

89.4%

Security researcher Paul Stone reported that a browser applet could be used to turn a simple mouse click into a drag-and-drop action, potentially resulting in the unintended loading of resources in a user’s browser. This behavior could be used twice in succession to first load a privileged chrome: URL in a victim’s browser, then load a malicious javascript: URL on top of the same document resulting in arbitrary script execution with chrome privileges.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.19
OR
mozillafirefoxRange<3.5.9
OR
mozillafirefoxRange<3.6.2
OR
mozillaseamonkeyRange<2.0.4
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

EPSS

0.022

Percentile

89.4%