Mozilla Firefox JavaScript Key Filtering Variant Vulnerability

BID:22524

Info

Mozilla Firefox JavaScript Key Filtering Variant Vulnerability

Bugtraq ID: 22524
Class: Design Error
CVE:
Remote: Yes
Local: No
Published: Feb 12 2007 12:00AM
Updated: Feb 13 2007 04:27AM
Credit: Charles McAuley discovered this issue; Michal Zalewski <[email protected]> provided further information and an exploit.
Vulnerable: Mozilla Firefox 2.0 .1
Mozilla Firefox 1.5.0.9
Not Vulnerable:

Discussion

Mozilla Firefox JavaScript Key Filtering Variant Vulnerability

Mozilla Firefox is prone to a JavaScript key-filtering vulnerability because the browser fails to securely handle keystroke input from users.

Exploiting this issue requires that users manually type the full path of files that attackers wish to download. This may require substantial typing from targeted users, so attackers will likely use keyboard-based games, blogs, or other similar pages to entice users to enter the required keyboard input to exploit this issue.

Mozilla Firefox 1.5.0.9 and 2.0.0.1 are vulnerable to this issue; other versions may also be affected. Applications based on the open-source Mozilla rendering engine may also be affected.

This issue is a variant of the one described in BID 18308 (Multiple Vendor Web Browser JavaScript Key Filtering Vulnerability).

Exploit / POC

Mozilla Firefox JavaScript Key Filtering Variant Vulnerability

The following URI hosts a proof-of-concept demonstration for this issue. Symantec cannot ensure the safety of third-party websites.

http://lcamtuf.coredump.cx/focusbug/ffversion.html

Solution / Fix

Mozilla Firefox JavaScript Key Filtering Variant Vulnerability

Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].

References

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report