Vulnerabilities > CVE-2004-0648 - Unspecified vulnerability in Mozilla Firefox, Mozilla and Thunderbird

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
mozilla
critical
nessus
exploit available

Summary

Mozilla (Suite) before 1.7.1, Firefox before 0.9.2, and Thunderbird before 0.7.2 allow remote attackers to launch arbitrary programs via a URI referencing the shell: protocol.

Exploit-Db

descriptionMozilla 1.7 External Protocol Handler Weakness. CVE-2004-0648. Remote exploit for windows platform
idEDB-ID:24263
last seen2016-02-02
modified2004-07-08
published2004-07-08
reporterKeith McCanless
sourcehttps://www.exploit-db.com/download/24263/
titleMozilla 1.7 External Protocol Handler Weakness

Nessus

NASL familyWindows
NASL idMOZILLA_FIREFOX_CODE_EXEC.NASL
descriptionThe remote host is using Mozilla and/or Firefox, a web browser. The remote version of this software contains a weakness that could allow an attacker to execute arbitrary commands on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id12642
published2004-07-09
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/12642
titleMozilla Browsers shell: URI Arbitrary Command Execution
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(12642);
 script_version("1.27");

 script_cve_id("CVE-2004-0648");
 script_bugtraq_id(10681);

 script_name(english:"Mozilla Browsers shell: URI Arbitrary Command Execution");
 script_summary(english:"Determines the version of Mozilla/Firefox");

 script_set_attribute( attribute:"synopsis", value:
"The remote Windows host contains a web browser that is affected by
a command execution vulnerability." );
 script_set_attribute( attribute:"description",  value:
"The remote host is using Mozilla and/or Firefox, a web browser.
The remote version of this software contains a weakness that could
allow an attacker to execute arbitrary commands on the remote host." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/fulldisclosure/2004/Jul/421"
 );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/fulldisclosure/2004/Jul/355"
 );
 script_set_attribute(
   attribute:"see_also",
   value:"http://mozilla.org/security/shell.html"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to Mozilla 1.7.1 / Firefox 0.9.2 or later."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/09");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/07/08");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/07/07");
 script_cvs_date("Date: 2018/11/15 20:50:27");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"Windows");
 script_dependencies("mozilla_org_installed.nasl");
 if ( NASL_LEVEL >= 3206 ) script_require_ports("Mozilla/Version", "Mozilla/Firefox/Version");
 exit(0);
}

#

include("misc_func.inc");

ver = read_version_in_kb("Mozilla/Version");
if (!isnull(ver))
{
  if (
    ver[0] < 1 ||
    (
      ver[0] == 1 &&
      (
        ver[1] < 7 ||
        (ver[1] == 7 && ver[2] == 0 && ver[3] < 1)
      )
    )
  )  security_hole(get_kb_item("SMB/transport"));
}

ver = read_version_in_kb("Mozilla/Firefox/Version");
if (!isnull(ver))
{
  if (
    ver[0] == 0 &&
    (
      ver[1] < 9 ||
      (ver[1] == 9 && ver[2] < 2)
    )
  ) security_hole(get_kb_item("SMB/transport"));
}