Уязвимость обхода ограничений при работе с локальными HTML-файлами в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
Эта уязвимость связана с возможностью злоумышленников обходить ограничения, наложенные на локальные HTML-файлы, в браузерах Mozilla Firefox до версий 2.0.0.17 и 3.x до 3.0.2, Thunderbird до 2.0.0.17 и SeaMonkey до 1.1.12. Используя последовательности обхода каталогов (directory traversal) в URI ресурсов, злоумышленник способен получить конфиденциальную информацию и побудить пользователей записать эту информацию в файл.
Затронутые версии ПО
- Mozilla Firefox до версии 2.0.0.17 и версии 3.x до 3.0.2
- Thunderbird до версии 2.0.0.17
- SeaMonkey до версии 1.1.12
Тип уязвимости
- Подмена и обход ограничений безопасности
- Утечка информации
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
7.8 High
CVSS2
Дефекты
Связанные уязвимости
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 a ...
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
EPSS
7.8 High
CVSS2