CVE-2008-4582

N/A Unknown
Published: October 15, 2008 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox 3.0.1 through 3.0.3, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13, when running on Windows, do not properly identify the context of Windows .url shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via an HTML document that is directly accessible through a filesystem, as demonstrated by documents in (1) local folders, (2) Windows share folders, and (3) RAR archives, and as demonstrated by IFRAMEs referencing shortcuts that point to (a) about:cache?device=memory and (b) about:cache?device=disk, a variant of CVE-2008-2810.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/32192
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32684
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32693
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32714
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32721
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32778
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32845
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/32853
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/33433
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/33434
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://secunia.com/advisories/34501
Source: cve@mitre.org
Permissions Required Third Party Advisory
http://securityreason.com/securityalert/4416
Source: cve@mitre.org
Third Party Advisory
http://securitytracker.com/alerts/2008/Nov/1021212.html
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-667-1
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2008/dsa-1669
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2008/dsa-1671
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2009/dsa-1696
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2009/dsa-1697
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/31611
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31747
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021190
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2818
Source: cve@mitre.org
Not Applicable
http://www.vupen.com/english/advisories/2009/0977
Source: cve@mitre.org
Not Applicable
https://bugzilla.mozilla.org/show_bug.cgi?id=455311
Source: cve@mitre.org
Issue Tracking
http://liudieyu0.blog124.fc2.com/blog-entry-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/32192
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32684
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32693
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32714
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32721
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32778
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32845
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/32853
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/33433
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/33434
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://secunia.com/advisories/34501
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required Third Party Advisory
http://securityreason.com/securityalert/4416
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://securitytracker.com/alerts/2008/Nov/1021212.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://ubuntu.com/usn/usn-667-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2008/dsa-1669
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2008/dsa-1671
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1696
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1697
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mozilla.org/security/announce/2008/mfsa2008-47.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/497091/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/31611
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31747
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021190
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/2818
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.vupen.com/english/advisories/2009/0977
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://bugzilla.mozilla.org/show_bug.cgi?id=455311
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/45740
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable

64 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
35.6%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla debian canonical microsoft