ID CVE-2007-2381
Summary The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
References
Vulnerable Configurations
  • cpe:2.3:a:mochikit:mochikit_framework:*:*:*:*:*:*:*:*
    cpe:2.3:a:mochikit:mochikit_framework:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 14-02-2024 - 01:17)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf
osvdb 43326
Last major update 14-02-2024 - 01:17
Published 30-04-2007 - 23:19
Last modified 14-02-2024 - 01:17
Back to Top