Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
Link | Tags |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html | mailing list |
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html | mailing list exploit vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A917 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2004-112.html | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9826 | vdb entry signature |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:021 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A873 | vdb entry signature |