Lucene search

K
mozillaMozilla FoundationMFSA2010-33
HistoryJun 22, 2010 - 12:00 a.m.

User tracking across sites using Math.random() β€” Mozilla

2010-06-2200:00:00
Mozilla Foundation
www.mozilla.org
37

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.021

Percentile

89.1%

Security researcher Amit Klein reported that it was possible to reverse engineer the value used to seed Math.random(). Since the pseudo-random number generator was only seeded once per browsing session, this seed value could be used as a unique token to identify and track users across different web sites.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.10
OR
mozillafirefoxRange<3.5.12
OR
mozillafirefoxRange<3.6.4
OR
mozillafirefoxRange<3.6.9
OR
mozillaseamonkeyRange<2.0.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.021

Percentile

89.1%