CVE-2007-4960

Argument injection vulnerability in the Linden Lab Second Life secondlife:// protocol handler, as used in Internet Explorer and possibly Firefox, allows remote attackers to obtain sensitive information via a '" ' (double-quote space) sequence followed by the -autologin and -loginuri arguments, which cause the handler to post login credentials and software installation details to an arbitrary URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linden_lab:second_life:1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://secunia.com/advisories/26845 - Vendor Advisory () http://secunia.com/advisories/26845 - Vendor Advisory
References () http://www.gnucitizen.org/blog/ie-pwns-secondlife - () http://www.gnucitizen.org/blog/ie-pwns-secondlife -
References () http://www.securityfocus.com/archive/1/479698/100/0/threaded - () http://www.securityfocus.com/archive/1/479698/100/0/threaded -
References () http://www.vupen.com/english/advisories/2007/3188 - () http://www.vupen.com/english/advisories/2007/3188 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36651 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36651 -

Information

Published : 2007-09-18 22:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4960

Mitre link : CVE-2007-4960

CVE.ORG link : CVE-2007-4960


JSON object : View

Products Affected

linden_lab

  • second_life
CWE
CWE-255

Credentials Management Errors

CWE-310

Cryptographic Issues