Vulnerabilities > CVE-2004-2225 - Unspecified vulnerability in Mozilla Firefox

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mozilla
nessus

Summary

Mozilla Firefox before 0.10.1 allows remote attackers to delete arbitrary files in the download directory via a crafted data: URI that is not properly handled when the user clicks the Save button.

Nessus

NASL familyWindows
NASL idMOZILLA_FIREFOX_FILES_RM.NASL
descriptionThe installed version of Firefox is earlier than 0.10.1. Such versions contain a weakness that could allow a remote attacker to delete arbitrary files in the user download directory. To exploit this, an attacker would need to trick a user into viewing a malicious web page.
last seen2020-06-01
modified2020-06-02
plugin id15408
published2004-10-02
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15408
titleFirefox < 0.10.1 Download Directory Arbitrary File Deletion
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(15408);
 script_version("1.23");
 script_cve_id("CVE-2004-2225");
 script_bugtraq_id(11311);

 script_name(english:"Firefox < 0.10.1 Download Directory Arbitrary File Deletion");
 script_summary(english:"Determines the version of Firefox");

 script_set_attribute( attribute:"synopsis", value:
"The remote Windows host contains a web browser that is affected by
an arbitrary file deletion vulnerability." );
 script_set_attribute( attribute:"description",  value:
"The installed version of Firefox is earlier than 0.10.1.  Such
versions contain a weakness that could allow a remote attacker
to delete arbitrary files in the user download directory.  To
exploit this, an attacker would need to trick a user into viewing
a malicious web page." );
 # https://blog.mozilla.org/press/2004/10/important-security-update-for-firefox-available/
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?640b32b9"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to Firefox 0.10.1 or later."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2004-2225");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/10/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/09/29");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/10/01");
 script_cvs_date("Date: 2018/09/17 21:46:53");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Windows");
 script_dependencies("mozilla_org_installed.nasl");
 script_require_keys("Mozilla/Firefox/Version");
 script_require_ports(139, 445);
 exit(0);
}

include("mozilla_version.inc");

port = get_kb_item_or_exit("SMB/transport");

installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, 'Firefox');

mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'0.10.1', severity:SECURITY_WARNING);