Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.800894
Category:General
Title:Lunascape Address Bar Spoofing Vulnerability
Summary:This host is installed with Lunascape Browser and is prone to Address; Bar Spoofing vulnerability.
Description:Summary:
This host is installed with Lunascape Browser and is prone to Address
Bar Spoofing vulnerability.

Vulnerability Insight:
Address bar can be spoofed via 'window.open()' with a relative
URI, to show an arbitrary URL on the web site visited by the victim, as
demonstrated by a visit to an attacker-controlled web page, which triggers a
spoofed login form for the site containing that page.

Vulnerability Impact:
Successful exploitation lets the attackers to spoof parts of the
address bar and modify page content on a host that a user may consider partly
trusted.

Affected Software/OS:
Lunascape version 5.1.3 and 5.1.4 on Windows.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3005
http://lostmon.blogspot.com/2009/08/multiple-browsers-fake-url-folder-file.html
XForce ISS Database: lunascape-windowopen-spoofing(53008)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53008
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.