CVE-2007-3670

N/A Unknown
Published: July 10, 2007 Modified: April 23, 2026
View on NVD

Description

Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe. NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/38017
Source: cve@mitre.org
http://secunia.com/advisories/25984
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26096
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26149
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26204
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26216
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26258
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26271
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26572
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/358017
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-199A.html
Source: cve@mitre.org
US Government Resource
http://larholm.com/2007/07/10/internet-explorer-0day-exploit/
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/38017
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25984
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26096
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26149
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26204
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26216
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26258
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26271
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26572
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28179
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28363
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/358017
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2007/mfsa2007-23.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2007/mfsa2007-40.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/473276/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24837
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018351
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018360
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-503-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA07-199A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.virusbtn.com/news/virus_news/2007/07_11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2473
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2565
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/4272
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0082
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/35346
Source: af854a3a-2127-422b-91ae-364da2661108

78 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
50.1%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla microsoft