First published: Mon Jul 07 2008(Updated: )
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat advanced workstation for the itanium processor | =2.1 | |
Red Hat Desktop | =3.0 | |
Red Hat Desktop | =4.0 | |
Red Hat Enterprise Linux | =5_server | |
Red Hat Enterprise Linux | =as_2.1 | |
Red Hat Enterprise Linux | =as_3 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_2.1 | |
Red Hat Enterprise Linux | =es_3 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_2.1 | |
Red Hat Enterprise Linux | =ws_3 | |
Red Hat Enterprise Linux | =ws_4 | |
redhat enterprise Linux desktop | =5_client | |
Red Hat Enterprise Linux Workstation | =5_client | |
Fedora | =8 | |
Ubuntu | =6.06 | |
Ubuntu | =6.06 | |
Ubuntu | =6.06 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.04 | |
Ubuntu | =7.04 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =7.10 | |
Ubuntu | =7.10 | |
Ubuntu | =7.10 | |
Ubuntu | =7.10 | |
Mozilla Firefox | =2.0 | |
Mozilla Firefox | =2.0-beta_1 | |
Mozilla Firefox | =2.0-rc2 | |
Mozilla Firefox | =2.0-rc3 | |
Mozilla Firefox | =2.0.0.2 | |
Mozilla Firefox | =2.0.0.3 | |
Mozilla Firefox | =2.0.0.11 | |
Mozilla Firefox | =2.0.0.12 | |
Mozilla Firefox | =2.0.0.13 | |
Mozilla Firefox | =2.0.0.14 | |
Mozilla Firefox | =2.0_.1 | |
Mozilla Firefox | =2.0_.4 | |
Mozilla Firefox | =2.0_.5 | |
Mozilla Firefox | =2.0_.6 | |
Mozilla Firefox | =2.0_.9 | |
Mozilla Firefox | =2.0_.10 | |
Mozilla Firefox | =2.0_8 | |
Mozilla SeaMonkey | =1.1-beta | |
Mozilla SeaMonkey | =1.1.1 | |
Mozilla SeaMonkey | =1.1.2 | |
Mozilla SeaMonkey | =1.1.3 | |
Mozilla SeaMonkey | =1.1.4 | |
Mozilla SeaMonkey | =1.1.5 | |
Mozilla SeaMonkey | =1.1.6 | |
Mozilla SeaMonkey | =1.1.7 | |
Mozilla SeaMonkey | =1.1.8 | |
Mozilla SeaMonkey | =1.1.9 | |
Mozilla Thunderbird | =2.0_.4 | |
Mozilla Thunderbird | =2.0_.5 | |
Mozilla Thunderbird | =2.0_.6 | |
Mozilla Thunderbird | =2.0_.9 | |
Mozilla Thunderbird | =2.0_.12 | |
Mozilla Thunderbird | =2.0_.13 | |
Mozilla Thunderbird | =2.0_.14 | |
Mozilla Thunderbird | =2.0_8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2808 is classified as a moderate severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2008-2808, upgrade to Mozilla Firefox version 2.0.0.15 or later and SeaMonkey version 1.1.10 or later.
CVE-2008-2808 affects Mozilla Firefox versions before 2.0.0.15 and SeaMonkey versions before 1.1.10.
Yes, CVE-2008-2808 can exploit vulnerabilities that may lead to unauthorized access to sensitive data through XSS attacks.
CVE-2008-2808 allows attackers to conduct cross-site scripting (XSS) attacks via crafted file:// URLs.