SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Netscape Vendors:   Netscape
Netscape '-moz-binding' Property Validation Flaw Lets Remote Users Conduct Cross-Domain Scripting Attacks
SecurityTracker Alert ID:  1015563
SecurityTracker URL:  http://securitytracker.com/id/1015563
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 2 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 8.1
Description:   A vulnerability was reported in Netscape. A remote user can conduct cross-domain scripting attacks.

The Netscape browser '-moz-binding' CSS property does not properly restrict HTML code from other domains before displaying the input. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code can originate from an arbitrary domain but will run in the security context of the domain serving the HTML. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the domain, access data recently submitted by the target user via web form to the domain, or take actions on the domain acting as the target user.

The vendor was notified on February 1, 2006.

Juha-Matti Laurio confirmed this vulnerability in Netscape. The vulnerability was originally reported as affecting Mozilla Firefox [CVE-2006-0496].

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.netscape.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Netscape -moz-binding Property Cross Domain Scripting Vulnerability

Description:
Netscape Browser version 8.1 (User-agent: Windows; U; Windows NT 5.0; en-US; rv:1.7.5) 
Gecko/20060111 Netscape/8.1) is confirmed as affected to recently published 
-moz-binding Cascading Style Sheet property vulnerability described at CVE-2006-0496.

Result:
Test cookies generated with javascript:document.cookie='test=something';void(0); are 
being disclosed with Bugzilla's expression XSS exploit-type URLs from Daniel Veditz.

Solution status:
No updated version available from the vendor at the time of reporting.

Affected versions:
Vulnerability has been confirmed in version 8.1. Other versions may also be affected.

Workarounds:
None working workarounds available.

CVE information: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0496 assigned 
to Mozilla Firefox and Mozilla Suite.

Credit information:
This issue was originally researched in Firefox by Chris Thomas.
Juha-Matti Laurio confirmed this vulnerability in Netscape.

Timeline:
1-Feb-2006 - Vulnerability researched and confirmed
2-Feb-2006 - Detailed research
2-Feb-2006 - Vendor contacted
2-Feb-2006 - Security companies and several CERT units contacted


Best regards,
Juha-Matti Laurio
security researcher
Finland
http://www.networksecurity.fi/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC