Vulnerability Name:
CVE-2007-3073 (CCN-34897)
Assigned:
2007-05-17
Published:
2007-05-17
Updated:
2018-10-16
Summary:
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
CVSS v3 Severity:
3.7 Low
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
7.8 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:N/A:N
)
7.4 High
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:N/A:N/E:H/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
None
Availibility (A):
None
2.6 Low
(CCN CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N
)
2.4 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Obtain Information
References:
Source: MITRE
Type: CNA
CVE-2007-3073
Source: MISC
Type: UNKNOWN
http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/
Source: MISC
Type: UNKNOWN
http://larholm.com/2007/05/25/firefox-0day-local-file-reading/
Source: MISC
Type: UNKNOWN
http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/
Source: OSVDB
Type: UNKNOWN
35920
Source: CCN
Type: SA25481
Mozilla Firefox / Seamonkey "resource://" Information Disclosure
Source: SECUNIA
Type: UNKNOWN
25481
Source: CCN
Type: OSVDB ID: 35920
Mozilla Firefox on Unix resource:// %2F Encoded Traversal Arbitrary File Access
Source: BUGTRAQ
Type: UNKNOWN
20070604 Unpatched input validation flaw in Firefox 2.0.0.4
Source: CCN
Type: Bugzilla@Mozilla - Bug 367428
resource:// directory traversal
Source: MISC
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=367428
Source: CCN
Type: Bugzilla@Mozilla - Bug 380994
Fix for bug 367428 lets through escaped slashes on Linux
Source: CONFIRM
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=380994
Source: XF
Type: UNKNOWN
mozilla-resourceuri-information-disclosure(34897)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
OR
cpe:/o:unix:unix:*:*:*:*:*:*:*:*
AND
cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:*
(Version <= 2.0.0.4)
Configuration CCN 1
:
cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:*
OR
cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
OR
cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
OR
cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
OR
cpe:/a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apple
mac os x *
apple
mac os x 10.0
apple
mac os x 10.0.1
apple
mac os x 10.0.2
apple
mac os x 10.0.3
apple
mac os x 10.0.4
apple
mac os x 10.1
apple
mac os x 10.1.1
apple
mac os x 10.1.2
apple
mac os x 10.1.3
apple
mac os x 10.1.4
apple
mac os x 10.1.5
apple
mac os x 10.2
apple
mac os x 10.2.1
apple
mac os x 10.2.2
apple
mac os x 10.2.3
apple
mac os x 10.2.4
apple
mac os x 10.2.5
apple
mac os x 10.2.6
apple
mac os x 10.2.7
apple
mac os x 10.2.8
apple
mac os x 10.3
apple
mac os x 10.3.1
apple
mac os x 10.3.2
apple
mac os x 10.3.3
apple
mac os x 10.3.4
apple
mac os x 10.3.5
apple
mac os x 10.3.6
apple
mac os x 10.3.7
apple
mac os x 10.3.8
apple
mac os x 10.3.9
apple
mac os x 10.4
apple
mac os x 10.4.1
apple
mac os x 10.4.2
apple
mac os x 10.4.3
apple
mac os x 10.4.4
apple
mac os x 10.4.5
apple
mac os x 10.4.6
apple
mac os x 10.4.7
apple
mac os x 10.4.8
apple
mac os x 10.4.9
unix
unix *
mozilla
firefox *
mozilla
firefox 2.0
mozilla
firefox 2.0.0.1
mozilla
firefox 2.0.0.2
mozilla
firefox 2.0.0.3
mozilla
firefox 2.0.0.4