Description
Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker. NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
Published: 2008-11-13
Score: 5.0 Medium
EPSS: 6.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1669-1 New xulrunner packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1671-1 New iceweasel packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1696-1 New icedove packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1697-1 New iceape packages fix several vulnerabilities
EUVD EUVD EUVD-2008-4991 Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker. NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
Ubuntu USN Ubuntu USN USN-667-1 Firefox and xulrunner vulnerabilities
Ubuntu USN Ubuntu USN USN-668-1 Thunderbird vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html cve-icon cve-icon
http://scary.beasts.org/security/CESA-2008-009.html cve-icon cve-icon
http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html cve-icon cve-icon
http://secunia.com/advisories/32684 cve-icon cve-icon
http://secunia.com/advisories/32693 cve-icon cve-icon
http://secunia.com/advisories/32694 cve-icon cve-icon
http://secunia.com/advisories/32714 cve-icon cve-icon
http://secunia.com/advisories/32715 cve-icon cve-icon
http://secunia.com/advisories/32778 cve-icon cve-icon
http://secunia.com/advisories/32798 cve-icon cve-icon
http://secunia.com/advisories/32845 cve-icon cve-icon
http://secunia.com/advisories/32853 cve-icon cve-icon
http://secunia.com/advisories/33433 cve-icon cve-icon
http://secunia.com/advisories/33434 cve-icon cve-icon
http://secunia.com/advisories/34501 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 cve-icon cve-icon
http://ubuntu.com/usn/usn-667-1 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1669 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1671 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1696 cve-icon cve-icon
http://www.debian.org/security/2009/dsa-1697 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:235 cve-icon cve-icon
http://www.mozilla.org/security/announce/2008/mfsa2008-48.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0976.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0977.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/498468 cve-icon cve-icon
http://www.securityfocus.com/bid/32281 cve-icon cve-icon
http://www.securityfocus.com/bid/32351 cve-icon cve-icon
http://www.securitytracker.com/id?1021187 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-319A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/3146 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/0977 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=355126 cve-icon cve-icon
https://bugzilla.mozilla.org/show_bug.cgi?id=451619 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-5012 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10750 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-5012 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html cve-icon cve-icon
History

No history.

Subscriptions

Mozilla Firefox Seamonkey Thunderbird
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T10:40:16.886Z

Reserved: 2008-11-10T00:00:00.000Z

Link: CVE-2008-5012

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-11-13T11:30:01.190

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-5012

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-11-12T00:00:00Z

Links: CVE-2008-5012 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses