CVE-2009-1312 : Détail

CVE-2009-1312

A05-Security Misconfiguration
6.82%V3
Network
2009-04-22
16h00 +00:00
2018-10-10
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-16 Category : Configuration
Weaknesses in this category are typically introduced during the configuration of the software.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 32942

Date de publication : 2009-04-21 22h00 +00:00
Auteur : Olli Pettay
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/34656/info The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox, Thunderbird, and SeaMonkey. Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, and execute arbitrary script code with elevated privileges; other attacks are also possible. With request to script at web site: http://www.example.com/script.php?param=javascript:alert(document.cookie) Which returns in answer the refresh header: refresh: 0; URL=javascript:alert(document.cookie)

Products Mentioned

Configuraton 0

Mozilla>>Firefox >> Version To (including) 3.0.8

Mozilla>>Firefox >> Version 0.1

Mozilla>>Firefox >> Version 0.2

Mozilla>>Firefox >> Version 0.3

Mozilla>>Firefox >> Version 0.4

Mozilla>>Firefox >> Version 0.5

Mozilla>>Firefox >> Version 0.6

Mozilla>>Firefox >> Version 0.6.1

Mozilla>>Firefox >> Version 0.7

Mozilla>>Firefox >> Version 0.7.1

Mozilla>>Firefox >> Version 0.8

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9

Mozilla>>Firefox >> Version 0.9.1

Mozilla>>Firefox >> Version 0.9.2

Mozilla>>Firefox >> Version 0.9.3

Mozilla>>Firefox >> Version 0.9_rc

    Mozilla>>Firefox >> Version 0.10

    Mozilla>>Firefox >> Version 0.10.1

    Mozilla>>Firefox >> Version 1.0

    Mozilla>>Firefox >> Version 1.0

    Mozilla>>Firefox >> Version 1.0.1

    Mozilla>>Firefox >> Version 1.0.2

    Mozilla>>Firefox >> Version 1.0.3

    Mozilla>>Firefox >> Version 1.0.4

    Mozilla>>Firefox >> Version 1.0.5

    Mozilla>>Firefox >> Version 1.0.6

    Mozilla>>Firefox >> Version 1.0.6

      Mozilla>>Firefox >> Version 1.0.7

      Mozilla>>Firefox >> Version 1.0.8

      Mozilla>>Firefox >> Version 1.5

      Mozilla>>Firefox >> Version 1.5

      Mozilla>>Firefox >> Version 1.5

      Mozilla>>Firefox >> Version 1.5.0.1

      Mozilla>>Firefox >> Version 1.5.0.2

      Mozilla>>Firefox >> Version 1.5.0.3

      Mozilla>>Firefox >> Version 1.5.0.4

      Mozilla>>Firefox >> Version 1.5.0.5

      Mozilla>>Firefox >> Version 1.5.0.6

      Mozilla>>Firefox >> Version 1.5.0.7

      Mozilla>>Firefox >> Version 1.5.0.8

      Mozilla>>Firefox >> Version 1.5.0.9

      Mozilla>>Firefox >> Version 1.5.0.10

      Mozilla>>Firefox >> Version 1.5.0.11

      Mozilla>>Firefox >> Version 1.5.0.12

      Mozilla>>Firefox >> Version 1.5.1

      Mozilla>>Firefox >> Version 1.5.2

      Mozilla>>Firefox >> Version 1.5.3

      Mozilla>>Firefox >> Version 1.5.4

      Mozilla>>Firefox >> Version 1.5.5

      Mozilla>>Firefox >> Version 1.5.6

      Mozilla>>Firefox >> Version 1.5.7

      Mozilla>>Firefox >> Version 1.5.8

      Mozilla>>Firefox >> Version 1.8

      Mozilla>>Firefox >> Version 2.0

      Mozilla>>Firefox >> Version 2.0

        Mozilla>>Firefox >> Version 2.0

          Mozilla>>Firefox >> Version 2.0

            Mozilla>>Firefox >> Version 2.0

              Mozilla>>Firefox >> Version 2.0.0.1

              Mozilla>>Firefox >> Version 2.0.0.2

              Mozilla>>Firefox >> Version 2.0.0.3

              Mozilla>>Firefox >> Version 2.0.0.4

              Mozilla>>Firefox >> Version 2.0.0.5

              Mozilla>>Firefox >> Version 2.0.0.6

              Mozilla>>Firefox >> Version 2.0.0.7

              Mozilla>>Firefox >> Version 2.0.0.8

              Mozilla>>Firefox >> Version 2.0.0.9

              Mozilla>>Firefox >> Version 2.0.0.10

              Mozilla>>Firefox >> Version 2.0.0.11

              Mozilla>>Firefox >> Version 2.0.0.12

              Mozilla>>Firefox >> Version 2.0.0.13

              Mozilla>>Firefox >> Version 2.0.0.14

              Mozilla>>Firefox >> Version 2.0.0.15

              Mozilla>>Firefox >> Version 2.0.0.16

              Mozilla>>Firefox >> Version 2.0.0.17

              Mozilla>>Firefox >> Version 2.0.0.18

              Mozilla>>Firefox >> Version 2.0.0.19

              Mozilla>>Firefox >> Version 2.0.0.20

              Mozilla>>Firefox >> Version 2.0.0.21

                Mozilla>>Firefox >> Version 2.0_8

                  Mozilla>>Firefox >> Version 3.0

                  Mozilla>>Firefox >> Version 3.0

                    Mozilla>>Firefox >> Version 3.0

                    Mozilla>>Firefox >> Version 3.0

                      Mozilla>>Firefox >> Version 3.0.1

                      Mozilla>>Firefox >> Version 3.0.2

                      Mozilla>>Firefox >> Version 3.0.3

                      Mozilla>>Firefox >> Version 3.0.4

                      Mozilla>>Firefox >> Version 3.0.5

                      Mozilla>>Firefox >> Version 3.0.6

                      Mozilla>>Firefox >> Version 3.0.7

                      Mozilla>>Firefox >> Version 3.0beta5

                        Mozilla>>Seamonkey >> Version *

                        Références

                        http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
                        Tags : vendor-advisory, x_refsource_MANDRIVA
                        http://secunia.com/advisories/34894
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        http://www.vupen.com/english/advisories/2009/1125
                        Tags : vdb-entry, x_refsource_VUPEN
                        http://secunia.com/advisories/34758
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        http://websecurity.com.ua/3386/
                        Tags : x_refsource_MISC
                        http://www.securitytracker.com/id?1022096
                        Tags : vdb-entry, x_refsource_SECTRACK
                        http://secunia.com/advisories/34844
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        http://websecurity.com.ua/3275/
                        Tags : x_refsource_MISC
                        http://secunia.com/advisories/35065
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        https://usn.ubuntu.com/764-1/
                        Tags : vendor-advisory, x_refsource_UBUNTU
                        http://www.securityfocus.com/bid/34656
                        Tags : vdb-entry, x_refsource_BID
                        http://secunia.com/advisories/34843
                        Tags : third-party-advisory, x_refsource_SECUNIA
                        http://rhn.redhat.com/errata/RHSA-2009-0437.html
                        Tags : vendor-advisory, x_refsource_REDHAT
                        http://www.redhat.com/support/errata/RHSA-2009-0436.html
                        Tags : vendor-advisory, x_refsource_REDHAT
                        http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1
                        Tags : vendor-advisory, x_refsource_SUNALERT