Vulnerabilities > CVE-2004-2225 - Unspecified vulnerability in Mozilla Firefox

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
mozilla
nessus

Summary

Mozilla Firefox before 0.10.1 allows remote attackers to delete arbitrary files in the download directory via a crafted data: URI that is not properly handled when the user clicks the Save button.

Nessus

NASL familyWindows
NASL idMOZILLA_FIREFOX_FILES_RM.NASL
descriptionThe installed version of Firefox is earlier than 0.10.1. Such versions contain a weakness that could allow a remote attacker to delete arbitrary files in the user download directory. To exploit this, an attacker would need to trick a user into viewing a malicious web page.
last seen2020-06-01
modified2020-06-02
plugin id15408
published2004-10-02
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15408
titleFirefox < 0.10.1 Download Directory Arbitrary File Deletion
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(15408);
 script_version("1.23");
 script_cve_id("CVE-2004-2225");
 script_bugtraq_id(11311);

 script_name(english:"Firefox < 0.10.1 Download Directory Arbitrary File Deletion");
 script_summary(english:"Determines the version of Firefox");

 script_set_attribute( attribute:"synopsis", value:
"The remote Windows host contains a web browser that is affected by
an arbitrary file deletion vulnerability." );
 script_set_attribute( attribute:"description",  value:
"The installed version of Firefox is earlier than 0.10.1.  Such
versions contain a weakness that could allow a remote attacker
to delete arbitrary files in the user download directory.  To
exploit this, an attacker would need to trick a user into viewing
a malicious web page." );
 # https://blog.mozilla.org/press/2004/10/important-security-update-for-firefox-available/
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?640b32b9"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to Firefox 0.10.1 or later."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N");
 script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2004-2225");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/10/02");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/09/29");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/10/01");
 script_cvs_date("Date: 2018/09/17 21:46:53");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_family(english:"Windows");
 script_dependencies("mozilla_org_installed.nasl");
 script_require_keys("Mozilla/Firefox/Version");
 script_require_ports(139, 445);
 exit(0);
}

include("mozilla_version.inc");

port = get_kb_item_or_exit("SMB/transport");

installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, 'Firefox');

mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'0.10.1', severity:SECURITY_WARNING);