Vulnerability Description
Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:// URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | All versions |
| Unix | Unix | All versions |
| Mozilla | Firefox | <= 2.0.0.4 |
References
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/
- http://larholm.com/2007/05/25/firefox-0day-local-file-reading/
- http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/
- http://osvdb.org/35920
- http://secunia.com/advisories/25481
- http://www.securityfocus.com/archive/1/470500/100/0/threaded
- https://bugzilla.mozilla.org/show_bug.cgi?id=367428
- https://bugzilla.mozilla.org/show_bug.cgi?id=380994
- http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/
- http://larholm.com/2007/05/25/firefox-0day-local-file-reading/
- http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/
- http://osvdb.org/35920
- http://secunia.com/advisories/25481
- http://www.securityfocus.com/archive/1/470500/100/0/threaded
- https://bugzilla.mozilla.org/show_bug.cgi?id=367428
FAQ
What is CVE-2007-3073?
CVE-2007-3073 is a vulnerability with a CVSS score of 7.8 (HIGH). Directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix allows remote attackers to read arbitrary files via ..%2F (dot dot encoded slash) sequences in a resource:...
How severe is CVE-2007-3073?
CVE-2007-3073 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3073?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Unix Unix, Mozilla Firefox.