#VU8610 Information disclosure in Prototype JavaScript Framework


Published: 2007-05-01 | Updated: 2017-09-27

Vulnerability identifier: #VU8610

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2007-2383

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Prototype JavaScript Framework
Web applications / JS libraries

Vendor: Prototype Core Team

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

Mitigation
Update to version 1.5.1 RC3 or later.

Vulnerable software versions

Prototype JavaScript Framework: 1.5.0


External links
http://prototypejs.org/2007/4/24/release-candidate-3
http://dev.rubyonrails.org/ticket/7910


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability