Rapid7 Vulnerability & Exploit Database

Mozilla security issue: Stealing secure HTTP Auth passwords via DNS spoof

Back to Search

Mozilla security issue: Stealing secure HTTP Auth passwords via DNS spoof

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
11/19/2003
Created
07/25/2018
Added
01/06/2005
Modified
07/22/2012

Description

The system is running a vulnerable version of the Mozilla browser. HTTP auth passwords were cached by site and port but did not store whether the protocol used was secure (SSL) or not. An attacker who could spoof your DNS could wait until you authenticate to a secure site then redirect a later connection to that site and port during that session to a non-SSL machine under their control, thus stealing the secure password.

Solution(s)

  • mozilla-firefox-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;