Mozilla Firefox 3.0.1 through 3.0.3, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via an HTML document that is directly accessible through a filesystem, as demonstrated by documents in (1) local folders, (2) Windows share folders, and (3) RAR archives, and as demonstrated by IFRAMEs referencing shortcuts that point to (a) about:cache?device=memory and (b) about:cache?device=disk, a variant of CVE-2008-2810.
References
Link Providers
http://liudieyu0.blog124.fc2.com/blog-entry-6.html cve-icon cve-icon
http://secunia.com/advisories/32192 cve-icon cve-icon
http://secunia.com/advisories/32684 cve-icon cve-icon
http://secunia.com/advisories/32693 cve-icon cve-icon
http://secunia.com/advisories/32714 cve-icon cve-icon
http://secunia.com/advisories/32721 cve-icon cve-icon
http://secunia.com/advisories/32778 cve-icon cve-icon
http://secunia.com/advisories/32845 cve-icon cve-icon
http://secunia.com/advisories/32853 cve-icon cve-icon
http://secunia.com/advisories/33433 cve-icon cve-icon
http://secunia.com/advisories/33434 cve-icon cve-icon
http://secunia.com/advisories/34501 cve-icon cve-icon
http://securityreason.com/securityalert/4416 cve-icon cve-icon
http://securitytracker.com/alerts/2008/Nov/1021212.html cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 cve-icon cve-icon
http://ubuntu.com/usn/usn-667-1 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1669 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1671 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1696 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1697 cve-icon cve-icon
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/497091/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/31611 cve-icon cve-icon
http://www.securityfocus.com/bid/31747 cve-icon cve-icon
http://www.securitytracker.com/id?1021190 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-319A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/2818 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0977 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=455311 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/45740 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-4582 cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-4582 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2008-10-15T20:00:00

Updated: 2024-08-07T10:24:19.339Z

Reserved: 2008-10-15T00:00:00

Link: CVE-2008-4582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-10-15T20:08:02.810

Modified: 2024-11-21T00:52:01.750

Link: CVE-2008-4582

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-10-08T00:00:00Z

Links: CVE-2008-4582 - Bugzilla