Shu_b
23.05.2006, 16:29
Firefox Exception Handling Full Path Disclosure Weakness
http://secunia.com/advisories/20244/
Secunia Advisory: SA20244
Release Date: 2006-05-23
Critical: Not critical
Impact: Exposure of system information
Where: From remote
Solution Status: Unpatched
Software:
Mozilla Firefox 0.x
Mozilla Firefox 1.x
Mozilla 1.7.x - http://secunia.com/advisories/20256/
Netscape 7.x - http://secunia.com/advisories/20255/
Netscape 8.x
Description:
A weakness has been discovered in Firefox, which can be exploited by malicious people to disclose system information.
The weakness is caused due to file path information being included in certain exceptions being thrown by the browser. This can e.g. be exploited to disclose the full installation path by calling the "window.sidebar.addSearchEngine()" JavaScript function with invalid parameters.
This may reportedly also be exploited to disclose the full path to the user's profile via errors thrown in installed extensions.
The weakness has been confirmed in version 1.5.0.3. Other versions may also be affected.
Solution: Disable JavaScript support.
Provided and/or discovered by:
Originally discovered by Martin Hassman and reported to public mailing lists by milw0rm.
Original Advisory:
https://bugzilla.mozilla.org/show_bug.cgi?id=267645
http://secunia.com/advisories/20244/
Secunia Advisory: SA20244
Release Date: 2006-05-23
Critical: Not critical
Impact: Exposure of system information
Where: From remote
Solution Status: Unpatched
Software:
Mozilla Firefox 0.x
Mozilla Firefox 1.x
Mozilla 1.7.x - http://secunia.com/advisories/20256/
Netscape 7.x - http://secunia.com/advisories/20255/
Netscape 8.x
Description:
A weakness has been discovered in Firefox, which can be exploited by malicious people to disclose system information.
The weakness is caused due to file path information being included in certain exceptions being thrown by the browser. This can e.g. be exploited to disclose the full installation path by calling the "window.sidebar.addSearchEngine()" JavaScript function with invalid parameters.
This may reportedly also be exploited to disclose the full path to the user's profile via errors thrown in installed extensions.
The weakness has been confirmed in version 1.5.0.3. Other versions may also be affected.
Solution: Disable JavaScript support.
Provided and/or discovered by:
Originally discovered by Martin Hassman and reported to public mailing lists by milw0rm.
Original Advisory:
https://bugzilla.mozilla.org/show_bug.cgi?id=267645