Vulnerability Name: | CVE-2007-3074 (CCN-34899) | ||||||||
Assigned: | 2007-05-16 | ||||||||
Published: | 2007-05-16 | ||||||||
Updated: | 2018-10-16 | ||||||||
Summary: | Mozilla Firefox 2.0.0.4 and earlier allows remote attackers to read files in the local Firefox installation directory via a resource:// URI. | ||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.1 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
2.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-200 | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-3074 Source: CCN Type: ha.ckers.org Web site ha.ckers.org web application security lab - Archive » Read Firefox Settings (PoC) Source: MISC Type: Exploit http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/ Source: MISC Type: Exploit http://larholm.com/2007/05/25/firefox-0day-local-file-reading/ Source: MISC Type: Exploit http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/ Source: OSVDB Type: UNKNOWN 35918 Source: CCN Type: SA25481 Mozilla Firefox / Seamonkey "resource://" Information Disclosure Source: SECUNIA Type: Vendor Advisory 25481 Source: CCN Type: OSVDB ID: 35918 Mozilla Firefox resource:// Installation Directory Arbitrary File Access Source: BUGTRAQ Type: UNKNOWN 20070604 Unpatched input validation flaw in Firefox 2.0.0.4 Source: CCN Type: Bugzilla@Mozilla - Bug 367428 resource:// directory traversal Source: MISC Type: UNKNOWN https://bugzilla.mozilla.org/show_bug.cgi?id=367428 Source: XF Type: UNKNOWN mozilla-dirresource-information-disclosure(34899) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |