CVE-2009-2654

N/A Unknown
Published: August 03, 2009 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/56717
Source: cve@mitre.org
http://secunia.com/advisories/36001
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36126
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36141
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36435
Source: cve@mitre.org
Vendor Advisory
http://www.mozilla.org/security/announce/2009/mfsa2009-44.html
Source: cve@mitre.org
Patch Vendor Advisory
http://www.securityfocus.com/bid/35803
Source: cve@mitre.org
Exploit Patch
http://www.vupen.com/english/advisories/2009/2006
Source: cve@mitre.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2142
Source: cve@mitre.org
Patch Vendor Advisory
https://usn.ubuntu.com/811-1/
Source: cve@mitre.org
http://blog.mozilla.com/security/2009/07/28/url-bar-spoofing-vulnerability/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://es.geocities.com/jplopezy/firefoxspoofing.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/56717
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36001
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36126
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36141
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36435
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36669
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36670
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-266148-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1873
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2009/mfsa2009-44.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1430.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1431.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1432.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/505242/30/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/505265
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35803
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.securitytracker.com/id?1022603
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/2006
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2142
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=451898
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/811-1/
Source: af854a3a-2127-422b-91ae-364da2661108

52 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
13.2%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla