First published: Fri Nov 24 2006(Updated: )
The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox and Thunderbird | =1.5-beta2 | |
Mozilla Firefox and Thunderbird | =1.5.0.6 | |
Mozilla Firefox and Thunderbird | =1.5.0.3 | |
Mozilla Firefox and Thunderbird | =1.5-beta1 | |
Mozilla Firefox and Thunderbird | =1.5 | |
Mozilla Firefox and Thunderbird | <=1.5.0.8 | |
Mozilla Firefox and Thunderbird | =1.5.0.7 | |
Mozilla Firefox and Thunderbird | =2.0 | |
Mozilla Firefox and Thunderbird | =1.5.0.5 | |
Mozilla Firefox and Thunderbird | =1.5.0.2 | |
Netscape Navigator | =8.1.2 | |
Mozilla Firefox and Thunderbird | =1.5.0.4 | |
Mozilla Firefox and Thunderbird | =1.5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6077 is classified as a medium severity vulnerability.
To fix CVE-2006-6077, users should update to Mozilla Firefox version 2.0 or later, or upgrade their Netscape Navigator to a safer version.
Mozilla Firefox versions 1.5 and 2.0, including all updates up to 1.5.0.8 are affected by CVE-2006-6077.
CVE-2006-6077 involves improper verification of the ACTION URL in a FORM element, leading to potential exposure of stored passwords.
Netscape Navigator version 8.1.2 is specifically mentioned as being affected by CVE-2006-6077.