Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the "." and "/" characters, which is not caught by the Phishing List blacklist filter.
References
Link | Resource |
---|---|
http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php | Broken Link Exploit Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=367538 | Issue Tracking Third Party Advisory |
http://osvdb.org/33705 | Broken Link |
http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html | Broken Link |
http://www.securityfocus.com/archive/1/459265/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-02-07 03:28
Updated : 2022-02-25 20:06
NVD link : CVE-2007-0802
Mitre link : CVE-2007-0802
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
mozilla
- firefox
opera
- opera_browser