FKIE_CVE-2002-1442
Vulnerability from fkie_nvd - Published: 2003-04-11 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as "My Computer" by opening a window to tools.google.com or the res: protocol, then using script to modify the window's location to the toolbar's configuration URL, which bypasses the origin verification check.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| toolbar | 1.1.41 | ||
| toolbar | 1.1.42 | ||
| toolbar | 1.1.43 | ||
| toolbar | 1.1.44 | ||
| toolbar | 1.1.45 | ||
| toolbar | 1.1.47 | ||
| toolbar | 1.1.48 | ||
| toolbar | 1.1.49 | ||
| toolbar | 1.1.53 | ||
| toolbar | 1.1.54 | ||
| toolbar | 1.1.55 | ||
| toolbar | 1.1.56 | ||
| toolbar | 1.1.57 | ||
| toolbar | 1.1.58 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "90B18B24-8E0C-41B3-9354-2506A05734A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "B41A4120-18F1-43B1-96B1-B97655671866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "64280CDE-BEB8-4A8D-A5B9-1F850ED002F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8876EA-F6FD-4EE9-A63E-31610525CC74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "599A6B58-9915-4D72-A850-7A34EE85159F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.47:*:*:*:*:*:*:*",
"matchCriteriaId": "0708ABF8-989D-4879-90D9-93D4D237F270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.48:*:*:*:*:*:*:*",
"matchCriteriaId": "C06A2E25-81C2-4645-A652-055A3E37F5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.49:*:*:*:*:*:*:*",
"matchCriteriaId": "6D763CC4-8E6D-40B3-A663-DA7148F66CFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "3B195D15-29BC-42B3-B931-696CC0527D2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "DAB91C2C-86DC-406C-89A1-2163B15F46E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D29CB61F-61B1-4710-9E8C-7D97060C0F26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.56:*:*:*:*:*:*:*",
"matchCriteriaId": "614061C9-AE7A-46B5-BD53-75CD69F15C44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.57:*:*:*:*:*:*:*",
"matchCriteriaId": "19A0D7E9-70F2-484B-8FA8-5B48052A46D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:toolbar:1.1.58:*:*:*:*:*:*:*",
"matchCriteriaId": "0200C2A1-578F-45F2-B677-9091BC49EF93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Google toolbar 1.1.58 and earlier allows remote web sites to perform unauthorized toolbar operations including script execution and file reading in other zones such as \"My Computer\" by opening a window to tools.google.com or the res: protocol, then using script to modify the window\u0027s location to the toolbar\u0027s configuration URL, which bypasses the origin verification check."
},
{
"lang": "es",
"value": "La barra de herramientas de Google 1.1.58 y versiones anteriores, permite a sitios web remotos realizar operaciones no autorizadas de la barra de herramientas, incluidas la ejecuci\u00f3n de rutinas y la lectura de ficheros en otras zonas como \u0027My Computer\u0027 abriendo una ventana a tools.google.com o el protocolo res:, y a continuaci\u00f3n utilizando rutinas para modificar la ubicaci\u00f3n de la ventana a la de la URL de configuraci\u00f3n de la barra de herramientas, con lo que se elude la verificaci\u00f3n original."
}
],
"id": "CVE-2002-1442",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2003-04-11T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://online.securityfocus.com/archive/1/286527"
},
{
"source": "cve@mitre.org",
"url": "http://sec.greymagic.com/adv/gm001-mc/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/5424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0066.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://online.securityfocus.com/archive/1/286527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sec.greymagic.com/adv/gm001-mc/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/5424"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…