CVE-2002-1442 (GCVE-0-2002-1442)

Vulnerability from cvelistv5 – Published: 2003-03-18 05:00 – Updated: 2024-08-08 03:26
VLAI?
Summary
The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as "My Computer" by opening a window to tools.google.com or the res: protocol, then using script to modify the window's location to the toolbar's configuration URL, which bypasses the origin verification check.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:26:28.694Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html"
          },
          {
            "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/286527"
          },
          {
            "name": "5424",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5424"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://sec.greymagic.com/adv/gm001-mc/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as \"My Computer\" by opening a window to tools.google.com or the res: protocol, then using script to modify the window\u0027s location to the toolbar\u0027s configuration URL, which bypasses the origin verification check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-21T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html"
        },
        {
          "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/286527"
        },
        {
          "name": "5424",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5424"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://sec.greymagic.com/adv/gm001-mc/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1442",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as \"My Computer\" by opening a window to tools.google.com or the res: protocol, then using script to modify the window\u0027s location to the toolbar\u0027s configuration URL, which bypasses the origin verification check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
              "refsource": "NTBUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html"
            },
            {
              "name": "20020808 Exploiting the Google toolbar (GM#001-MC)",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/286527"
            },
            {
              "name": "5424",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5424"
            },
            {
              "name": "http://sec.greymagic.com/adv/gm001-mc/",
              "refsource": "MISC",
              "url": "http://sec.greymagic.com/adv/gm001-mc/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1442",
    "datePublished": "2003-03-18T05:00:00",
    "dateReserved": "2003-02-05T00:00:00",
    "dateUpdated": "2024-08-08T03:26:28.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-1442\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-04-11T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as \\\"My Computer\\\" by opening a window to tools.google.com or the res: protocol, then using script to modify the window\u0027s location to the toolbar\u0027s configuration URL, which bypasses the origin verification check.\"},{\"lang\":\"es\",\"value\":\"La barra de herramientas de Google 1.1.58 y versiones anteriores, permite a sitios web remotos realizar operaciones no autorizadas de la barra de herramientas, incluidas la ejecuci\u00f3n de rutinas y la lectura de ficheros en otras zonas como \u0027My Computer\u0027 abriendo una ventana a tools.google.com o el protocolo res:, y a continuaci\u00f3n utilizando rutinas para modificar la ubicaci\u00f3n de la ventana a la de la URL de configuraci\u00f3n de la barra de herramientas, con lo que se elude la verificaci\u00f3n original.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B18B24-8E0C-41B3-9354-2506A05734A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B41A4120-18F1-43B1-96B1-B97655671866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64280CDE-BEB8-4A8D-A5B9-1F850ED002F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC8876EA-F6FD-4EE9-A63E-31610525CC74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599A6B58-9915-4D72-A850-7A34EE85159F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0708ABF8-989D-4879-90D9-93D4D237F270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06A2E25-81C2-4645-A652-055A3E37F5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D763CC4-8E6D-40B3-A663-DA7148F66CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B195D15-29BC-42B3-B931-696CC0527D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB91C2C-86DC-406C-89A1-2163B15F46E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29CB61F-61B1-4710-9E8C-7D97060C0F26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614061C9-AE7A-46B5-BD53-75CD69F15C44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A0D7E9-70F2-484B-8FA8-5B48052A46D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:toolbar:1.1.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0200C2A1-578F-45F2-B677-9091BC49EF93\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://online.securityfocus.com/archive/1/286527\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sec.greymagic.com/adv/gm001-mc/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/5424\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://online.securityfocus.com/archive/1/286527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sec.greymagic.com/adv/gm001-mc/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/5424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…