Lucene search

K
mozillaMozilla FoundationMFSA2010-79
HistoryDec 09, 2010 - 12:00 a.m.

Java security bypass from LiveConnect loaded via data: URL meta refresh — Mozilla

2010-12-0900:00:00
Mozilla Foundation
www.mozilla.org
19

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.023

Percentile

89.8%

Security researcher Gregory Fleischer reported that when a Java LiveConnect script was loaded via a data: URL which redirects via a meta refresh, then the resulting plugin object was created with the wrong security principal and thus received elevated privileges such as the abilities to read local files, launch processes, and create network connections.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.16
OR
mozillafirefoxRange<3.6.13
OR
mozillaseamonkeyRange<2.0.11
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.023

Percentile

89.8%