[Snort-sigs] rule documentation for WEB-CLIENT Javascript URL host spoofing attempt

Josh.Sakofsky at ...1573... Josh.Sakofsky at ...1573...
Fri Jun 6 13:36:05 EDT 2003

Rule: WEB-CLIENT Javascript URL host spoofing attempt

Sid: 1841

Summary: A local user has possibly visited a website containing malicious 
javascript code.

Impact: Minimal

Detailed Information: Certain versions of Mozilla and Netscape may allow 
script code to access local cookie data.
By accessing a maliciously coded webpage, a users cookie data from any 
domain may be viewed by the website's admin.

Affected Systems: Mozilla versions less than 1.0.1 and Netscape versions 
less than 6.2.1 

Attack Scenarios: A devious website admin creates a webpage with malicious 
code and obtains sensitive cookie data
from a visiting user's web browser about any domain he wishes.

Ease of Attack: Trivial

False Positives: None Known

False Negatives: None Known

Corrective Action: Upgrade Mozilla or Netscape.

Contributors: Original rule writer unknown.
              Josh Sakofsky
Additional References: http://www.securityfocus.com/bid/5293
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/1292f7b3/attachment.html>

More information about the Snort-sigs mailing list