CVE-2008-2933

Current Description

Mozilla Firefox before 2.0.0.16, and 3.x before 3.0.1, interprets '|' (pipe) characters in a command-line URI as requests to open multiple tabs, which allows remote attackers to access chrome:i URIs, or read arbitrary local files via manipulations involving a series of URIs that is not entirely handled by a vector application, as exploited in conjunction with CVE-2008-2540. NOTE: this issue exists because of an insufficient fix for CVE-2005-2267.

Evaluator Description

This attack only works if the user is using another internet-connected application with Firefox not running. Using Firefox, or making sure it is at least running, prevents this attack.

Referenced by CVEs:CVE-2008-3198

Basic Data

PublishedJuly 17, 2008
Last ModifiedOctober 11, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.6
SeverityLOW
Exploitability Score4.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMozillaFirefox0.8*******
    2.3ApplicationMozillaFirefox0.9*******
    2.3ApplicationMozillaFirefox0.9.1*******
    2.3ApplicationMozillaFirefox0.9.2*******
    2.3ApplicationMozillaFirefox0.9.3*******
    2.3ApplicationMozillaFirefox0.10*******
    2.3ApplicationMozillaFirefox0.10.1*******
    2.3ApplicationMozillaFirefox1.0*******
    2.3ApplicationMozillaFirefox1.0.1*******
    2.3ApplicationMozillaFirefox1.0.2*******
    2.3ApplicationMozillaFirefox1.0.3*******
    2.3ApplicationMozillaFirefox1.0.4*******
    2.3ApplicationMozillaFirefox1.0.5*******
    2.3ApplicationMozillaFirefox1.0.6*******
    2.3ApplicationMozillaFirefox1.0.7*******
    2.3ApplicationMozillaFirefox1.0.8*******
    2.3ApplicationMozillaFirefox1.5*******
    2.3ApplicationMozillaFirefox1.5.0.1*******
    2.3ApplicationMozillaFirefox1.5.0.2*******
    2.3ApplicationMozillaFirefox1.5.0.3*******
    2.3ApplicationMozillaFirefox1.5.0.4*******
    2.3ApplicationMozillaFirefox1.5.0.5*******
    2.3ApplicationMozillaFirefox1.5.0.6*******
    2.3ApplicationMozillaFirefox1.5.0.7*******
    2.3ApplicationMozillaFirefox1.5.0.8*******
    2.3ApplicationMozillaFirefox1.5.0.9*******
    2.3ApplicationMozillaFirefox1.5.0.10*******
    2.3ApplicationMozillaFirefox1.5.0.11*******
    2.3ApplicationMozillaFirefox1.5.0.12*******
    2.3ApplicationMozillaFirefox1.5.1*******
    2.3ApplicationMozillaFirefox1.5.2*******
    2.3ApplicationMozillaFirefox1.5.3*******
    2.3ApplicationMozillaFirefox1.5.4*******
    2.3ApplicationMozillaFirefox1.5.5*******
    2.3ApplicationMozillaFirefox1.5.6*******
    2.3ApplicationMozillaFirefox1.5.7*******
    2.3ApplicationMozillaFirefox1.5.8*******
    2.3ApplicationMozillaFirefox1.8*******
    2.3ApplicationMozillaFirefox2.0*******
    2.3ApplicationMozillaFirefox2.0.0.1*******
    2.3ApplicationMozillaFirefox2.0.0.2*******
    2.3ApplicationMozillaFirefox2.0.0.3*******
    2.3ApplicationMozillaFirefox2.0.0.4*******
    2.3ApplicationMozillaFirefox2.0.0.5*******
    2.3ApplicationMozillaFirefox2.0.0.6*******
    2.3ApplicationMozillaFirefox2.0.0.7*******
    2.3ApplicationMozillaFirefox2.0.0.8*******
    2.3ApplicationMozillaFirefox2.0.0.9*******
    2.3ApplicationMozillaFirefox2.0.0.10*******
    2.3ApplicationMozillaFirefox2.0.0.11*******
    2.3ApplicationMozillaFirefox2.0.0.12*******
    2.3ApplicationMozillaFirefox2.0.0.13*******
    2.3ApplicationMozillaFirefox2.0.0.14*******
    2.3ApplicationMozillaFirefox********2.0.0.15
    2.3ApplicationMozillaFirefox2.0_.1*******
    2.3ApplicationMozillaFirefox2.0_.4*******
    2.3ApplicationMozillaFirefox2.0_.5*******
    2.3ApplicationMozillaFirefox2.0_.6*******
    2.3ApplicationMozillaFirefox2.0_.7*******
    2.3ApplicationMozillaFirefox2.0_.9*******
    2.3ApplicationMozillaFirefox2.0_.10*******
    2.3ApplicationMozillaFirefox2.0_8*******
    2.3ApplicationMozillaFirefox3.0*******

Vulnerable Software List

VendorProductVersions
Mozilla Firefox *, 0.10, 0.10.1, 0.8, 0.9, 0.9.1, 0.9.2, 0.9.3, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.5, 1.5.0.1, 1.5.0.10, 1.5.0.11, 1.5.0.12, 1.5.0.2, 1.5.0.3, 1.5.0.4, 1.5.0.5, 1.5.0.6, 1.5.0.7, 1.5.0.8, 1.5.0.9, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 1.8, 2.0, 2.0.0.1, 2.0.0.10, 2.0.0.11, 2.0.0.12, 2.0.0.13, 2.0.0.14, 2.0.0.2, 2.0.0.3, 2.0.0.4, 2.0.0.5, 2.0.0.6, 2.0.0.7, 2.0.0.8, 2.0.0.9, 2.0_.1, 2.0_.10, 2.0_.4, 2.0_.5, 2.0_.6, 2.0_.7, 2.0_.9, 2.0_8, 3.0

References

NameSourceURLTags
31106http://secunia.com/advisories/31106SECUNIA
31120http://secunia.com/advisories/31120SECUNIA
31121http://secunia.com/advisories/31121SECUNIA
31129http://secunia.com/advisories/31129SECUNIA
31145http://secunia.com/advisories/31145SECUNIA
31157http://secunia.com/advisories/31157SECUNIA
31176http://secunia.com/advisories/31176SECUNIA
31183http://secunia.com/advisories/31183SECUNIA
31261http://secunia.com/advisories/31261SECUNIA
31270http://secunia.com/advisories/31270SECUNIA
31306http://secunia.com/advisories/31306SECUNIA
31377http://secunia.com/advisories/31377SECUNIA
33433http://secunia.com/advisories/33433SECUNIA
34501http://secunia.com/advisories/34501SECUNIA
GLSA-200808-03http://security.gentoo.org/glsa/glsa-200808-03.xmlGENTOO
256408http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1SUNALERT
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238CONFIRM
DSA-1614http://www.debian.org/security/2008/dsa-1614DEBIAN
DSA-1615http://www.debian.org/security/2008/dsa-1615DEBIAN
DSA-1697http://www.debian.org/security/2009/dsa-1697DEBIAN
VU#130923http://www.kb.cert.org/vuls/id/130923CERT-VNUS Government Resource
MDVSA-2008:148http://www.mandriva.com/security/advisories?name=MDVSA-2008:148MANDRIVA
http://www.mozilla.org/security/announce/2008/mfsa2008-35.htmlhttp://www.mozilla.org/security/announce/2008/mfsa2008-35.htmlCONFIRM
http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5031400http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuildeCONFIRM
RHSA-2008:0597http://www.redhat.com/support/errata/RHSA-2008-0597.htmlREDHAT
RHSA-2008:0598http://www.redhat.com/support/errata/RHSA-2008-0598.htmlREDHAT
20080729 rPSA-2008-0238-1 firefoxhttp://www.securityfocus.com/archive/1/494860/100/0/threadedBUGTRAQ
30242http://www.securityfocus.com/bid/30242BID
1020500http://www.securitytracker.com/id?1020500SECTRACK
SSA:2008-198-01http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380974SLACKWARE
USN-623-1http://www.ubuntu.com/usn/usn-623-1UBUNTU
USN-626-1http://www.ubuntu.com/usn/usn-626-1UBUNTU
USN-626-2http://www.ubuntu.com/usn/usn-626-2UBUNTU
ADV-2009-0977http://www.vupen.com/english/advisories/2009/0977VUPEN
https://bugzilla.mozilla.org/show_bug.cgi?id=441120https://bugzilla.mozilla.org/show_bug.cgi?id=441120CONFIRM
firefox-commandline-uri-security-bypass(43832)https://exchange.xforce.ibmcloud.com/vulnerabilities/43832XF
https://issues.rpath.com/browse/RPL-2683https://issues.rpath.com/browse/RPL-2683CONFIRM
oval:org.mitre.oval:def:11618https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11618OVAL