Information disclosure in Prototype JS



Published: 2007-05-01 | Updated: 2017-09-27
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2007-2383
CWE-ID CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Prototype JavaScript Framework
Web applications / JS libraries

Vendor Prototype Core Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU8610

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2007-2383

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

Mitigation

Update to version 1.5.1 RC3 or later.

Vulnerable software versions

Prototype JavaScript Framework: 1.5.0

CPE2.3 External links

http://prototypejs.org/2007/4/24/release-candidate-3
http://dev.rubyonrails.org/ticket/7910


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###