Mozilla Firefox nsXMLDocument::OnChannelRedirect() Domain Validation Bug Lets Remote Users Conduct Cross-Domain Scripting Attacks
|
SecurityTracker Alert ID: 1020919 |
SecurityTracker URL: http://securitytracker.com/id/1020919
|
CVE Reference:
CVE-2008-3835
(Links to External Site)
|
Date: Sep 24 2008
|
Impact:
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 2.0.0.17
|
Description:
A vulnerability was reported in Mozilla Firefox. A remote user can conduct cross-domain scripting attacks.
The nsXMLDocument::OnChannelRedirect() function does not properly validate JavaScript origin. A remote user can create a specially crafted HTML that, when loaded by a target user, will execute arbitrary scripting code in the context of a different site. The code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Thunderbird and SeaMonkey are also affected.
moz_bug_r_a4 reproted this vulnerability.
|
Impact:
A remote user can access the target user's cookies (including authentication cookies), if any, associated with an arbitrary site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
|
Solution:
The vendor has issued a fixed version (2.0.0.17).
The vendor's advisory is available at:
http://www.mozilla.org/security/announce/2008/mfsa2008-38.html
|
Vendor URL: www.mozilla.org/security/announce/2008/mfsa2008-38.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|