First published: Fri Feb 08 2008(Updated: )
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <=2.0.0.11 | |
Mozilla SeaMonkey | <=1.1.7 | |
Firefox | <=2.0.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0418 is considered a moderate severity vulnerability that allows directory traversal in affected Mozilla applications.
To fix CVE-2008-0418, you should upgrade to the latest version of Mozilla Firefox, Thunderbird, or SeaMonkey, as versions prior to 2.0.0.12 and 1.1.8 are vulnerable.
CVE-2008-0418 affects Mozilla Firefox versions up to 2.0.0.11, Thunderbird versions up to 2.0.0.11, and SeaMonkey versions up to 1.1.7.
CVE-2008-0418 is a directory traversal vulnerability that could allow attackers to read sensitive files via the chrome: URI scheme.
The risks associated with CVE-2008-0418 include unauthorized access to arbitrary files, which could lead to session hijacking or data exposure.