Mozilla Firefox 2.0.0.4 and earlier allows remote attackers to read files in the local Firefox installation directory via a resource:// URI.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/470500/100/0/threaded | mailing list |
http://osvdb.org/35918 | vdb entry |
http://larholm.com/2007/06/04/unpatched-input-validation-flaw-in-firefox-2004/ | exploit |
http://larholm.com/2007/05/25/firefox-0day-local-file-reading/ | exploit |
http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/ | exploit |
https://bugzilla.mozilla.org/show_bug.cgi?id=367428 | |
http://secunia.com/advisories/25481 | third party advisory vendor advisory |