Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mjp2-qv3r-5pqp

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

EPSS

Процентиль: 67%
0.00546
Низкий

Дефекты

CWE-79

Связанные уязвимости

ubuntu
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

nvd
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

debian
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMon ...

EPSS

Процентиль: 67%
0.00546
Низкий

Дефекты

CWE-79