HTTP: Firefox WYCIWYG URI Cache Zone Bypass

This signature detects attempts to exploit a known vulnerability in Mozilla FireFox. An attacker can create a malicious Web page containing dangerous URI's, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Mozilla Firefox is prone to a cache-zone-bypass vulnerability because the application fails to properly block remote access to special internally generated URIs containing cached data. Exploiting this issue allows remote attackers to access potentially sensitive information and to place markers with similar functionality to cookies onto targeted users' computers, regardless of cookie security settings. Information harvested in successful exploits may aid in further attacks. Attackers may also potentially exploit this issue to perform cache-poisoning or URL-spoofing attacks. This issue is being tracked by Mozilla's Bugzilla Bug 387333.

Affected Products

Mozilla firefox

Short Name
HTTP:STC:MOZILLA:FF-WYCIWYG
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Bypass CVE-2007-3656 Cache Firefox URI WYCIWYG Zone bid:24831
Release Date
11/07/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Suse

Gentoo

Sun

Rpath

Mozilla

Iceape_internet_suite

Avaya

Sgi

Slackware

Ubuntu

Mandriva

Foresight_linux

Debian

CVSS Score

6.8

Found a potential security threat?