First published: Tue Sep 24 2002(Updated: )
Mozilla 1.1 and earlier, and Mozilla-based browsers such as Netscape and Galeon, set the document referrer too quickly in certain situations when a new page is being loaded, which allows web pages to determine the next page that is being visited, including manually entered URLs, using the onunload handler.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =0.9.5 | |
Mozilla Firefox | =0.9.3 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Firefox | =0.9.7 | |
Galeon Browser | =1.2.6 | |
Galeon Browser | =1.2.5 | |
Mozilla Firefox | =0.9.8 | |
Mozilla Firefox | =0.9.4 | |
Galeon Browser | =1.2.4 | |
Mozilla Firefox | =0.9.6 | |
Mozilla Firefox | =1.1 | |
Mozilla Firefox | =0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1126 is classified as a moderate severity vulnerability due to its potential to expose users' browsing behavior.
To fix CVE-2002-1126, users should upgrade to a later version of Mozilla or Mozilla-based browsers that have patched the vulnerability.
CVE-2002-1126 affects Mozilla versions 0.9.3 through 1.1 and Mozilla-based browsers such as Netscape and Galeon.
CVE-2002-1126 is an information disclosure vulnerability that allows websites to infer users' next page visits.
Yes, CVE-2002-1126 can be exploited remotely by malicious web pages that can leverage the vulnerability to track user navigation.