J-Security Center

Title: Mozilla Firefox OnKeyDown Event File Upload Vulnerability

Severity: MODERATE

Description:

Mozilla FireFox is prone to an information disclosure vulnerability. This issue can allow an attacker to obtain access to sensitive files.

This issue stems from a design error resulting from the improper handling of form fields. An attacker can change the focus from a 'textarea' field to a 'file upload' field using the 'onKeyDown' JavaScript event.

User interaction is required to carry out attacks. Attackers can exploit this issue by enticing a user to visit a website to supply text data by typing into a 'textarea' field. This data could be used to construct a filename. That attacker would use this vulnerability to change the focus to a hidden 'file upload' field, supply the filename to the field, and potentially obtain a file represented by the filename from the user's computer.

All versions of Firefox are considered vulnerable.

Affected Products:

  • Avaya Intuity AUDIX LX 2.0
  • Avaya Message Networking 3.1
  • Avaya Message Networking MN 3.1
  • Avaya Messaging Storage Server 3.1
  • Avaya Messaging Storage Server MM3.0
  • Avaya Messaging Storage Server MSS 3.0
  • Debian Iceape 1.0.11
  • Debian Iceweasel
  • Debian Linux 4.0
  • Debian Linux 4.0 alpha
  • Debian Linux 4.0 amd64
  • Debian Linux 4.0 arm
  • Debian Linux 4.0 hppa
  • Debian Linux 4.0 ia-32
  • Debian Linux 4.0 ia-64
  • Debian Linux 4.0 m68k
  • Debian Linux 4.0 mips
  • Debian Linux 4.0 mipsel
  • Debian Linux 4.0 powerpc
  • Debian Linux 4.0 s/390
  • Debian Linux 4.0 sparc
  • Foresight Linux Foresight Linux 1.1
  • Linux kernel 2.4.19
  • Linux kernel 2.4.21
  • Linux kernel 2.6.5
  • MandrakeSoft Corporate Server 3.0.0
  • MandrakeSoft Corporate Server 3.0.0 x86_64
  • MandrakeSoft Corporate Server 4.0
  • MandrakeSoft Corporate Server 4.0.0 x86_64
  • MandrakeSoft Linux Mandrake 2007.1
  • MandrakeSoft Linux Mandrake 2007.1 x86_64
  • MandrakeSoft Linux Mandrake 2008.0
  • MandrakeSoft Linux Mandrake 2008.0 x86_64
  • Mozilla Firefox 1.5.0
  • Mozilla Firefox 1.5.0 12
  • Mozilla Firefox 1.5.0 beta 1
  • Mozilla Firefox 1.5.0 beta 2
  • Mozilla Firefox 1.5.0.1
  • Mozilla Firefox 1.5.0.10
  • Mozilla Firefox 1.5.0.11
  • Mozilla Firefox 1.5.0.2
  • Mozilla Firefox 1.5.0.2
  • Mozilla Firefox 1.5.0.3
  • Mozilla Firefox 1.5.0.4
  • Mozilla Firefox 1.5.0.5
  • Mozilla Firefox 1.5.0.6
  • Mozilla Firefox 1.5.0.6
  • Mozilla Firefox 1.5.0.7
  • Mozilla Firefox 1.5.0.8
  • Mozilla Firefox 1.5.0.8
  • Mozilla Firefox 1.5.0.9
  • Mozilla Firefox 2.0
  • Mozilla Firefox 2.0 RC2
  • Mozilla Firefox 2.0 RC3
  • Mozilla Firefox 2.0 beta 1
  • Mozilla Firefox 2.0.0.1
  • Mozilla Firefox 2.0.0.2
  • Mozilla Firefox 2.0.0.3
  • Mozilla Firefox 2.0.0.3
  • Mozilla Firefox 2.0.0.4
  • Mozilla Firefox 2.0.0.5
  • Mozilla Firefox 2.0.0.6
  • Mozilla Firefox 2.0.0.7
  • Mozilla SeaMonkey 1.0
  • Mozilla SeaMonkey 1.0 dev
  • Mozilla SeaMonkey 1.0.1
  • Mozilla SeaMonkey 1.0.2
  • Mozilla SeaMonkey 1.0.3
  • Mozilla SeaMonkey 1.0.5
  • Mozilla SeaMonkey 1.0.6
  • Mozilla SeaMonkey 1.0.7
  • Mozilla SeaMonkey 1.0.8
  • Mozilla SeaMonkey 1.0.9
  • Mozilla SeaMonkey 1.0.99
  • Mozilla SeaMonkey 1.1 beta
  • Mozilla SeaMonkey 1.1.1
  • Mozilla SeaMonkey 1.1.2
  • Mozilla SeaMonkey 1.1.3
  • Mozilla SeaMonkey 1.1.4
  • RedHat Advanced Workstation for the Itanium Processor 2.1.0
  • RedHat Desktop 3.0.0
  • RedHat Desktop 4.0.0
  • RedHat Enterprise Linux 5 server
  • RedHat Enterprise Linux AS 2.1
  • RedHat Enterprise Linux AS 3
  • RedHat Enterprise Linux AS 4
  • RedHat Enterprise Linux Desktop 5 client
  • RedHat Enterprise Linux Desktop Workstation 5 client
  • RedHat Enterprise Linux Desktop version 4
  • RedHat Enterprise Linux ES 2.1
  • RedHat Enterprise Linux ES 3
  • RedHat Enterprise Linux ES 4
  • RedHat Enterprise Linux Optional Productivity Application 5 server
  • RedHat Enterprise Linux WS 2.1
  • RedHat Enterprise Linux WS 3
  • RedHat Enterprise Linux WS 4
  • RedHat Fedora 7
  • RedHat Fedora Core6
  • S.u.S.E. Linux 10.0 ppc
  • S.u.S.E. Linux 10.0 x86
  • S.u.S.E. Linux 10.0 x86-64
  • S.u.S.E. Linux 10.1 ppc
  • S.u.S.E. Linux 10.1 x86
  • S.u.S.E. Linux 10.1 x86-64
  • S.u.S.E. Linux Enterprise Server 10.SP1
  • S.u.S.E. Linux Enterprise Server 8
  • S.u.S.E. Linux Enterprise Server 9
  • S.u.S.E. Linux Personal 10.0.0 OSS
  • S.u.S.E. Linux Personal 10.1
  • S.u.S.E. Linux Personal 10.2
  • S.u.S.E. Linux Personal 10.2 x86_64
  • S.u.S.E. Linux Professional 10.0.0
  • S.u.S.E. Linux Professional 10.0.0 OSS
  • S.u.S.E. Linux Professional 10.1
  • S.u.S.E. Linux Professional 10.2
  • S.u.S.E. Linux Professional 10.2 x86_64
  • S.u.S.E. Novell Linux Desktop 9
  • S.u.S.E. Novell Linux POS 9
  • S.u.S.E. Open-Enterprise-Server
  • S.u.S.E. SUSE LINUX Retail Solution 8.0.0
  • S.u.S.E. SUSE Linux Enterprise Desktop 10 SP1
  • S.u.S.E. SUSE Linux Enterprise Server 10 SP1
  • S.u.S.E. SuSE Linux Openexchange Server 4.0.0
  • S.u.S.E. SuSE Linux School Server for i386
  • S.u.S.E. SuSE Linux Standard Server 8.0.0
  • S.u.S.E. UnitedLinux 1.0.0
  • S.u.S.E. openSUSE 10.2
  • S.u.S.E. openSUSE 10.3
  • Slackware Linux -current
  • Slackware Linux 10.2.0
  • Slackware Linux 11.0
  • Slackware Linux 12.0
  • Sun Solaris 10
  • Sun Solaris 10_x86
  • Ubuntu Ubuntu Linux 6.06 LTS amd64
  • Ubuntu Ubuntu Linux 6.06 LTS i386
  • Ubuntu Ubuntu Linux 6.06 LTS powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS sparc
  • Ubuntu Ubuntu Linux 6.10 amd64
  • Ubuntu Ubuntu Linux 6.10 i386
  • Ubuntu Ubuntu Linux 6.10 powerpc
  • Ubuntu Ubuntu Linux 6.10 sparc
  • Ubuntu Ubuntu Linux 7.04 amd64
  • Ubuntu Ubuntu Linux 7.04 i386
  • Ubuntu Ubuntu Linux 7.04 powerpc
  • Ubuntu Ubuntu Linux 7.04 sparc
  • Ubuntu Ubuntu Linux 7.10 amd64
  • Ubuntu Ubuntu Linux 7.10 i386
  • Ubuntu Ubuntu Linux 7.10 powerpc
  • Ubuntu Ubuntu Linux 7.10 sparc
  • rPath rPath Linux 1

References:

Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.