4.3

CVE-2008-4067

Exploit

Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version < 2.0.0.17
   LinuxLinux Kernel Version-
MozillaFirefox Version >= 3.0 < 3.0.2
   LinuxLinux Kernel Version-
MozillaSeamonkey Version < 1.1.12
   LinuxLinux Kernel Version-
MozillaThunderbird Version < 2.0.0.17
   LinuxLinux Kernel Version-
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version7.04
CanonicalUbuntu Linux Version7.10
CanonicalUbuntu Linux Version8.04 SwEditionlts
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.72% 0.817
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

https://bugzilla.mozilla.org/show_bug.cgi?id=380994
Vendor Advisory
Exploit
Issue Tracking
http://www.securityfocus.com/bid/31346
Third Party Advisory
VDB Entry
http://www.0x000000.com/?i=422
Third Party Advisory
http://www.securitytracker.com/id?1020921
Third Party Advisory
VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=394075
Vendor Advisory
Exploit
Issue Tracking