Vulnerability Details : CVE-2007-3670
Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2007-3670
- cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3670
71.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3670
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2007-3670
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3670
-
http://www.us-cert.gov/cas/techalerts/TA07-199A.html
US Government Resource
-
http://www.mozilla.org/security/announce/2007/mfsa2007-40.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/35346
-
http://www.securitytracker.com/id?1018351
-
http://www.vupen.com/english/advisories/2008/0082
Site en construction
-
http://www.mozilla.org/security/announce/2007/mfsa2007-23.html
-
http://www.securityfocus.com/bid/24837
-
http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx
-
http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/
-
http://www.ubuntu.com/usn/usn-503-1
-
http://www.vupen.com/english/advisories/2007/2565
-
http://www.novell.com/linux/security/advisories/2007_49_mozilla.html
-
http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html
-
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt
-
http://larholm.com/2007/07/10/internet-explorer-0day-exploit/
-
http://www.vupen.com/english/advisories/2007/4272
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565
-
http://www.securitytracker.com/id?1018360
-
http://www.vupen.com/english/advisories/2007/2473
-
http://www.kb.cert.org/vuls/id/358017
US Government Resource
-
http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/
-
http://www.virusbtn.com/news/virus_news/2007/07_11.xml
-
http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
-
http://www.securityfocus.com/archive/1/473276/100/0/threaded
-
http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html
Jump to