JVN#25448394
Sleipnir and Grani vulnerable to arbitrary script execution when Bookmark search results are restored from history
Overview
Sleipnir and Grani, web browsers from Fenrir & Co., contain a vulnerability in the bookmark search function that allows an attacker to execute an arbitrary script when search results are restored from history.
Products Affected
- Sleipnir 2.7.1 Release2 and earlier
- Portable Sleipnir 2.7.1 Release2 and earlier
- Grani 3.1 and earlier
Description
Sleipnir and Grani, web browsers from Fenrir & Co., have a bookmark search function. When a user runs the search function, the search result is displayed in the web browser. If a specially crafted string is used in a search, an arbitrary script may be executed on the user's web browser when the search results are restored from history.
Impact
An arbitrary script may be executed in the user's web browser.
Solution
Update the Software
Apply the latest updates provided by Fenrir & Co.
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.06.04
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Complex - the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspicious |
|
Exploit Complexity | High - large amount of expertise and/or luck required (BIOS expertise, guessing correctly in a large space) |
|
Credit
Shuya Ueki reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2008-2567 |
JVN iPedia |
JVNDB-2008-000029 |