Mozilla Firefox nsGlobalWindow.cpp MakeScriptDialogTitle authentication spoofing

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $5k-$25k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Mozilla Firefox. This impacts the function MakeScriptDialogTitle of the file nsGlobalWindow.cpp. The manipulation leads to authentication spoofing.
This vulnerability is uniquely identified as CVE-2009-4130. No exploit exists.
Details
A vulnerability was found in Mozilla Firefox (Web Browser) (affected version not known). It has been rated as critical. This issue affects the function MakeScriptDialogTitle of the file nsGlobalWindow.cpp. The manipulation with an unknown input leads to a authentication spoofing vulnerability. Using CWE to declare the problem leads to CWE-290. This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. Impacted is integrity, and availability. The summary by CVE is:
Visual truncation vulnerability in the MakeScriptDialogTitle function in nsGlobalWindow.cpp in Mozilla Firefox allows remote attackers to spoof the origin domain name of a script via a long name.
The weakness was disclosed 12/14/2009 (Website). The advisory is shared at archives.neohapsis.com. The identification of this vulnerability is CVE-2009-4130 since 12/01/2009. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details are known, but no exploit is available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 05/02/2017).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (54612), SecurityFocus (BID 37232†), SecurityTracker (ID 1023287†) and Vulnerability Center (SBV-39975†). The entry VDB-51136 is pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.mozilla.org/
- Product: https://www.mozilla.org/en-US/firefox/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.5
VulDB Base Score: 6.5
VulDB Temp Score: 6.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Authentication spoofingCWE: CWE-290 / CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 801094
OpenVAS Name: Mozilla Firefox Multiple Spoofing Vulnerabilies - dec09 (Linux)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
12/01/2009 🔍12/07/2009 🔍
12/07/2009 🔍
12/08/2009 🔍
12/14/2009 🔍
12/14/2009 🔍
06/12/2013 🔍
03/18/2015 🔍
05/02/2017 🔍
Sources
Vendor: mozilla.orgProduct: mozilla.org
Advisory: archives.neohapsis.com
Status: Not defined
CVE: CVE-2009-4130 (🔍)
GCVE (CVE): GCVE-0-2009-4130
GCVE (VulDB): GCVE-100-51137
X-Force: 54612
SecurityFocus: 37232 - Mozilla Firefox 'MakeScriptDialogTitle()' URI Spoofing Vulnerability
SecurityTracker: 1023287 - Mozilla Firefox JavaScript Bugs Let Remote Users Spoof Prompt Dialogs
Vulnerability Center: 39975 - Mozilla Firefox 3.0 - 3.5.5 Remote Spoofing Vulnerability due to an Issue in the MakeScriptDialogTitle Function, Medium
See also: 🔍
Entry
Created: 03/18/2015 15:15Updated: 05/02/2017 08:39
Changes: 03/18/2015 15:15 (60), 05/02/2017 08:39 (7)
Complete: 🔍
Cache ID: 216:AA0:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.