Lucene search

K
mozillaMozilla FoundationMFSA2013-27
HistoryFeb 19, 2013 - 12:00 a.m.

Phishing on HTTPS connection through malicious proxy — Mozilla

2013-02-1900:00:00
Mozilla Foundation
www.mozilla.org
31

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

EPSS

0.002

Percentile

61.0%

Google security researcher Michal Zalewski reported an issue where the browser displayed the content of a proxy’s 407 response if a user canceled the proxy’s authentication prompt. In this circumstance, the addressbar will continue to show the requested site’s address, including HTTPS addresses that appear to be secure. This spoofing of addresses can be used for phishing attacks by fooling users into entering credentials, for example.

Affected configurations

Vulners
Node
mozillafirefoxRange<19
OR
mozillafirefox_esrRange<17.0.3
OR
mozillaseamonkeyRange<2.16
OR
mozillathunderbirdRange<17.0.3
OR
mozillathunderbird_esrRange<17.0.3

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

EPSS

0.002

Percentile

61.0%