First published: Fri Aug 28 2009(Updated: )
K-Meleon 1.5.3 allows context-dependent attackers to spoof the address bar, via window.open with a relative URI, to show an arbitrary file: URL after a victim has visited any file: URL, as demonstrated by a visit to a file: document written by the attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
christophe thibault K-Meleon | =1.5.3 | |
K-Meleon | =1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3008 is considered a moderate security vulnerability due to its potential for spoofing attacks.
To fix CVE-2009-3008, update K-Meleon to a version that addresses this vulnerability, preferably beyond 1.5.3.
CVE-2009-3008 enables context-dependent spoofing attacks, allowing malicious content to mislead users about URLs.
K-Meleon versions 1.5.3 are affected by CVE-2009-3008.
Yes, CVE-2009-3008 can lead to data leakage as attackers can spoof file URLs shown in the address bar.