Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mjp2-qv3r-5pqp

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

EPSS

Процентиль: 67%
0.00546
Низкий

Дефекты

CWE-79

Связанные уязвимости

ubuntu
почти 18 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

nvd
почти 18 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

debian
почти 18 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMon ...

EPSS

Процентиль: 67%
0.00546
Низкий

Дефекты

CWE-79