The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.beford.org/?p=8 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - | |
References | () http://osvdb.org/43477 - | |
References | () http://www.mozilla.org/security/announce/2007/mfsa2007-37.html - | |
References | () http://www.vupen.com/english/advisories/2008/0083 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=369814 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=403331 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6033 - |
Information
Published : 2007-12-28 21:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6589
Mitre link : CVE-2007-6589
CVE.ORG link : CVE-2007-6589
JSON object : View
Products Affected
mozilla
- firefox
- seamonkey
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')