Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19037
HistoryFeb 10, 2008 - 12:00 a.m.

Mozilla Foundation Security Advisory 2008-05

2008-02-1000:00:00
vulners.com
49

Mozilla Foundation Security Advisory 2008-05

Title: Directory traversal via chrome: URI
Impact: High
Announced: February 7, 2008
Reporter: Gerry Eisenhaur
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 2.0.0.12
Thunderbird 2.0.0.12
SeaMonkey 1.1.8
Description

Gerry Eisenhaur reported the chrome: URI scheme improperly allowed directory traversal that could be used to load JavaScript, images, and stylesheets from local files in known locations. This traversal was possible only when the browser had installed add-ons which used "flat" packaging rather than the more popular .jar packaging, and the attacker would need to target that specific add-on.

Mozilla researcher moz_bug_r_a4 reported that this vulnerability could be used to steal the contents of the browser's sessionstore.js file, which contains session cookie data and information about currently open web pages.
Workaround

Disable "flat-packaged" add-ons until a version containing these fixes can be installed.
References

* chrome: directory traversal
* Partial list of "flat" packaged add-ons
* Bug 413250 allows access to sessionstore.js
* CVE-2008-0418