CVE-2007-3511

The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0646.html
http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0658.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://osvdb.org/37994
http://secunia.com/advisories/25904 Vendor Advisory
http://secunia.com/advisories/27276 Vendor Advisory
http://secunia.com/advisories/27298 Vendor Advisory
http://secunia.com/advisories/27325 Vendor Advisory
http://secunia.com/advisories/27327 Vendor Advisory
http://secunia.com/advisories/27335 Vendor Advisory
http://secunia.com/advisories/27336 Vendor Advisory
http://secunia.com/advisories/27356 Vendor Advisory
http://secunia.com/advisories/27383 Vendor Advisory
http://secunia.com/advisories/27387 Vendor Advisory
http://secunia.com/advisories/27403 Vendor Advisory
http://secunia.com/advisories/27414 Vendor Advisory
http://secunia.com/advisories/27425 Vendor Advisory
http://secunia.com/advisories/27480 Vendor Advisory
http://secunia.com/advisories/27680 Vendor Advisory
http://securitytracker.com/id?1018837
http://sla.ckers.org/forum/read.php?3%2C13142
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html
http://www.debian.org/security/2007/dsa-1392
http://www.debian.org/security/2007/dsa-1396
http://www.debian.org/security/2007/dsa-1401
http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202
http://www.mozilla.org/security/announce/2007/mfsa2007-32.html
http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
http://www.redhat.com/support/errata/RHSA-2007-0979.html
http://www.redhat.com/support/errata/RHSA-2007-0980.html
http://www.redhat.com/support/errata/RHSA-2007-0981.html
http://www.securityfocus.com/archive/1/482876/100/200/threaded
http://www.securityfocus.com/archive/1/482925/100/0/threaded
http://www.securityfocus.com/archive/1/482932/100/200/threaded
http://www.securityfocus.com/bid/24725
http://www.ubuntu.com/usn/usn-536-1
http://www.vupen.com/english/advisories/2007/3544 Vendor Advisory
http://www.vupen.com/english/advisories/2007/3587 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083 Vendor Advisory
http://yathong.googlepages.com/FirefoxFocusBug.html Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/35299
https://issues.rpath.com/browse/RPL-1858
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763
https://usn.ubuntu.com/535-1/
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html
http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0646.html
http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0658.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://osvdb.org/37994
http://secunia.com/advisories/25904 Vendor Advisory
http://secunia.com/advisories/27276 Vendor Advisory
http://secunia.com/advisories/27298 Vendor Advisory
http://secunia.com/advisories/27325 Vendor Advisory
http://secunia.com/advisories/27327 Vendor Advisory
http://secunia.com/advisories/27335 Vendor Advisory
http://secunia.com/advisories/27336 Vendor Advisory
http://secunia.com/advisories/27356 Vendor Advisory
http://secunia.com/advisories/27383 Vendor Advisory
http://secunia.com/advisories/27387 Vendor Advisory
http://secunia.com/advisories/27403 Vendor Advisory
http://secunia.com/advisories/27414 Vendor Advisory
http://secunia.com/advisories/27425 Vendor Advisory
http://secunia.com/advisories/27480 Vendor Advisory
http://secunia.com/advisories/27680 Vendor Advisory
http://securitytracker.com/id?1018837
http://sla.ckers.org/forum/read.php?3%2C13142
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html
http://www.debian.org/security/2007/dsa-1392
http://www.debian.org/security/2007/dsa-1396
http://www.debian.org/security/2007/dsa-1401
http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202
http://www.mozilla.org/security/announce/2007/mfsa2007-32.html
http://www.novell.com/linux/security/advisories/2007_57_mozilla.html
http://www.redhat.com/support/errata/RHSA-2007-0979.html
http://www.redhat.com/support/errata/RHSA-2007-0980.html
http://www.redhat.com/support/errata/RHSA-2007-0981.html
http://www.securityfocus.com/archive/1/482876/100/200/threaded
http://www.securityfocus.com/archive/1/482925/100/0/threaded
http://www.securityfocus.com/archive/1/482932/100/200/threaded
http://www.securityfocus.com/bid/24725
http://www.ubuntu.com/usn/usn-536-1
http://www.vupen.com/english/advisories/2007/3544 Vendor Advisory
http://www.vupen.com/english/advisories/2007/3587 Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083 Vendor Advisory
http://yathong.googlepages.com/FirefoxFocusBug.html Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/35299
https://issues.rpath.com/browse/RPL-1858
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763
https://usn.ubuntu.com/535-1/
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:beta:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:33

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0646.html - () http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0646.html -
References () http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0658.html - () http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0658.html -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 -
References () http://osvdb.org/37994 - () http://osvdb.org/37994 -
References () http://secunia.com/advisories/25904 - Vendor Advisory () http://secunia.com/advisories/25904 - Vendor Advisory
References () http://secunia.com/advisories/27276 - Vendor Advisory () http://secunia.com/advisories/27276 - Vendor Advisory
References () http://secunia.com/advisories/27298 - Vendor Advisory () http://secunia.com/advisories/27298 - Vendor Advisory
References () http://secunia.com/advisories/27325 - Vendor Advisory () http://secunia.com/advisories/27325 - Vendor Advisory
References () http://secunia.com/advisories/27327 - Vendor Advisory () http://secunia.com/advisories/27327 - Vendor Advisory
References () http://secunia.com/advisories/27335 - Vendor Advisory () http://secunia.com/advisories/27335 - Vendor Advisory
References () http://secunia.com/advisories/27336 - Vendor Advisory () http://secunia.com/advisories/27336 - Vendor Advisory
References () http://secunia.com/advisories/27356 - Vendor Advisory () http://secunia.com/advisories/27356 - Vendor Advisory
References () http://secunia.com/advisories/27383 - Vendor Advisory () http://secunia.com/advisories/27383 - Vendor Advisory
References () http://secunia.com/advisories/27387 - Vendor Advisory () http://secunia.com/advisories/27387 - Vendor Advisory
References () http://secunia.com/advisories/27403 - Vendor Advisory () http://secunia.com/advisories/27403 - Vendor Advisory
References () http://secunia.com/advisories/27414 - Vendor Advisory () http://secunia.com/advisories/27414 - Vendor Advisory
References () http://secunia.com/advisories/27425 - Vendor Advisory () http://secunia.com/advisories/27425 - Vendor Advisory
References () http://secunia.com/advisories/27480 - Vendor Advisory () http://secunia.com/advisories/27480 - Vendor Advisory
References () http://secunia.com/advisories/27680 - Vendor Advisory () http://secunia.com/advisories/27680 - Vendor Advisory
References () http://securitytracker.com/id?1018837 - () http://securitytracker.com/id?1018837 -
References () http://sla.ckers.org/forum/read.php?3%2C13142 - () http://sla.ckers.org/forum/read.php?3%2C13142 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 -
References () http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html - () http://support.novell.com/techcenter/psdb/60eb95b75c76f9fbfcc9a89f99cd8f79.html -
References () http://www.debian.org/security/2007/dsa-1392 - () http://www.debian.org/security/2007/dsa-1392 -
References () http://www.debian.org/security/2007/dsa-1396 - () http://www.debian.org/security/2007/dsa-1396 -
References () http://www.debian.org/security/2007/dsa-1401 - () http://www.debian.org/security/2007/dsa-1401 -
References () http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202 - () http://www.mandriva.com/en/security/advisories?name=MDKSA-2007:202 -
References () http://www.mozilla.org/security/announce/2007/mfsa2007-32.html - () http://www.mozilla.org/security/announce/2007/mfsa2007-32.html -
References () http://www.novell.com/linux/security/advisories/2007_57_mozilla.html - () http://www.novell.com/linux/security/advisories/2007_57_mozilla.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0979.html - () http://www.redhat.com/support/errata/RHSA-2007-0979.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0980.html - () http://www.redhat.com/support/errata/RHSA-2007-0980.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0981.html - () http://www.redhat.com/support/errata/RHSA-2007-0981.html -
References () http://www.securityfocus.com/archive/1/482876/100/200/threaded - () http://www.securityfocus.com/archive/1/482876/100/200/threaded -
References () http://www.securityfocus.com/archive/1/482925/100/0/threaded - () http://www.securityfocus.com/archive/1/482925/100/0/threaded -
References () http://www.securityfocus.com/archive/1/482932/100/200/threaded - () http://www.securityfocus.com/archive/1/482932/100/200/threaded -
References () http://www.securityfocus.com/bid/24725 - () http://www.securityfocus.com/bid/24725 -
References () http://www.ubuntu.com/usn/usn-536-1 - () http://www.ubuntu.com/usn/usn-536-1 -
References () http://www.vupen.com/english/advisories/2007/3544 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3544 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2007/3587 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3587 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/0083 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0083 - Vendor Advisory
References () http://yathong.googlepages.com/FirefoxFocusBug.html - Exploit () http://yathong.googlepages.com/FirefoxFocusBug.html - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35299 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35299 -
References () https://issues.rpath.com/browse/RPL-1858 - () https://issues.rpath.com/browse/RPL-1858 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9763 -
References () https://usn.ubuntu.com/535-1/ - () https://usn.ubuntu.com/535-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html - () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00498.html -
References () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html - () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00285.html -
References () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html - () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00355.html -

07 Nov 2023, 02:00

Type Values Removed Values Added
References
  • {'url': 'http://sla.ckers.org/forum/read.php?3,13142', 'name': 'http://sla.ckers.org/forum/read.php?3,13142', 'tags': [], 'refsource': 'MISC'}
  • () http://sla.ckers.org/forum/read.php?3%2C13142 -

Information

Published : 2007-07-03 10:30

Updated : 2024-11-21 00:33


NVD link : CVE-2007-3511

Mitre link : CVE-2007-3511

CVE.ORG link : CVE-2007-3511


JSON object : View

Products Affected

mozilla

  • firefox
  • seamonkey