Vulnerability Description
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.4 on Windows allows remote attackers to read arbitrary files via ..%5C (dot dot encoded backslash) sequences in a resource:// URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | 2.0 |
Related Weaknesses (CWE)
References
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/Exploit
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/#comment-35888
- http://larholm.com/2007/05/25/firefox-0day-local-file-reading/Exploit
- http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/
- http://osvdb.org/35922
- http://secunia.com/advisories/25481Vendor Advisory
- http://www.securityfocus.com/archive/1/470500/100/0/threaded
- https://bugzilla.mozilla.org/show_bug.cgi?id=367428
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/Exploit
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/#comment-35888
- http://larholm.com/2007/05/25/firefox-0day-local-file-reading/Exploit
- http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/
- http://osvdb.org/35922
- http://secunia.com/advisories/25481Vendor Advisory
- http://www.securityfocus.com/archive/1/470500/100/0/threaded
FAQ
What is CVE-2007-3072?
CVE-2007-3072 is a vulnerability with a CVSS score of 7.1 (HIGH). Directory traversal vulnerability in Mozilla Firefox before 2.0.0.4 on Windows allows remote attackers to read arbitrary files via ..%5C (dot dot encoded backslash) sequences in a resource:// URI.
How severe is CVE-2007-3072?
CVE-2007-3072 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3072?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.