[Snort-sigs] rule documentation for WEB-CLIENT Javascript URL host spoofing attempt

Josh.Sakofsky at ...1573... Josh.Sakofsky at ...1573...
Fri Jun 6 13:36:05 EDT 2003


Rule: WEB-CLIENT Javascript URL host spoofing attempt

--
Sid: 1841

--
Summary: A local user has possibly visited a website containing malicious 
javascript code.

--
Impact: Minimal

--
Detailed Information: Certain versions of Mozilla and Netscape may allow 
script code to access local cookie data.
By accessing a maliciously coded webpage, a users cookie data from any 
domain may be viewed by the website's admin.

--
Affected Systems: Mozilla versions less than 1.0.1 and Netscape versions 
less than 6.2.1 

--
Attack Scenarios: A devious website admin creates a webpage with malicious 
code and obtains sensitive cookie data
from a visiting user's web browser about any domain he wishes.

--
Ease of Attack: Trivial

--
False Positives: None Known

--
False Negatives: None Known

--
Corrective Action: Upgrade Mozilla or Netscape.

--
Contributors: Original rule writer unknown.
              Josh Sakofsky
-- 
Additional References: http://www.securityfocus.com/bid/5293
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/1292f7b3/attachment.html>


More information about the Snort-sigs mailing list