TITLE: Firefox Exception Handling Full Path Disclosure Weakness SECUNIA ADVISORY ID: SA20244 VERIFY ADVISORY: http://secunia.com/advisories/20244/ CRITICAL: Not critical IMPACT: Exposure of system information WHERE: >From remote SOFTWARE: Mozilla Firefox 1.x http://secunia.com/product/4227/ Mozilla Firefox 0.x http://secunia.com/product/3256/ DESCRIPTION: A weakness has been discovered in Firefox, which can be exploited by malicious people to disclose system information. The weakness is caused due to file path information being included in certain exceptions being thrown by the browser. This can e.g. be exploited to disclose the full installation path by calling the "window.sidebar.addSearchEngine()" JavaScript function with invalid parameters. This may reportedly also be exploited to disclose the full path to the user's profile via errors thrown in installed extensions. The weakness has been confirmed in version 1.5.0.3. Other versions may also be affected. SOLUTION: Disable JavaScript support. PROVIDED AND/OR DISCOVERED BY: Originally discovered by Martin Hassman and reported to public mailing lists by milw0rm. ORIGINAL ADVISORY: https://bugzilla.mozilla.org/show_bug.cgi?id=267645 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------