First published: Tue Mar 18 2003(Updated: )
The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as "My Computer" by opening a window to tools.google.com or the res: protocol, then using script to modify the window's location to the toolbar's configuration URL, which bypasses the origin verification check.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Toolbar | =1.1.41 | |
Google Toolbar | =1.1.42 | |
Google Toolbar | =1.1.43 | |
Google Toolbar | =1.1.44 | |
Google Toolbar | =1.1.45 | |
Google Toolbar | =1.1.47 | |
Google Toolbar | =1.1.48 | |
Google Toolbar | =1.1.49 | |
Google Toolbar | =1.1.53 | |
Google Toolbar | =1.1.54 | |
Google Toolbar | =1.1.55 | |
Google Toolbar | =1.1.56 | |
Google Toolbar | =1.1.57 | |
Google Toolbar | =1.1.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1442 is classified as a high severity vulnerability due to its potential for unauthorized script execution and sensitive file access.
To mitigate CVE-2002-1442, update the Google toolbar to version 1.1.59 or later to close the vulnerability.
CVE-2002-1442 affects versions of Google toolbar from 1.1.41 to 1.1.58.
CVE-2002-1442 can be exploited to perform unauthorized operations from remote web sites, including script execution and file reading.
Yes, CVE-2002-1442 can be exploited through phishing attempts that trick users into visiting malicious sites.