Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2008-12-17 23:30
Updated : 2024-02-28 11:21
NVD link : CVE-2008-5506
Mitre link : CVE-2008-5506
CVE.ORG link : CVE-2008-5506
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- firefox
- thunderbird
- seamonkey
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls