Overview
A vulnerability exists in the way Mozilla products with certain extensions handle chrome: URIs that may allow directory traversal.
Description
Mozilla extensions are small add-ons that can be integrated with Mozilla products to provide added functionality. Mozilla products contain a vulnerability in the way chrome: URIs are handled when certain browser extentions are installed. According to the Mozilla Foundation Security Advisory 2008-05: the chrome: URI scheme improperly allowed directory traversal that could be used to load JavaScript, images, and stylesheets from local files in known locations. This traversal was possible only when the browser had installed add-ons which used "flat" packaging rather than the more popular .jar packaging, and the attacker would need to target that specific add-on. |
Impact
A remote, unauthorized attacker may be able to execute code on a vulnerable system or view browser history information. |
Solution
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability is addressed in Mozilla Foundation Security Advisory 2008-05. Mozilla credits Gerry Eisenhaur for reporting this issue.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2008-0418 |
Severity Metric: | 4.73 |
Date Public: | 2008-02-07 |
Date First Published: | 2008-02-11 |
Date Last Updated: | 2008-02-11 14:52 UTC |
Document Revision: | 7 |