Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1585

Опубликовано: 01 мар. 2011
Источник: redhat
CVSS2: 6.8

Описание

The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 4.8firefoxAffected
Red Hat Enterprise Linux Extended Update Support 5.6firefoxAffected
Red Hat Enterprise Linux Extended Update Support 6.0firefoxAffected
Red Hat Enterprise Linux Extended Update Support 6.0thunderbirdAffected
Red Hat Enterprise Linux 4firefoxFixedRHSA-2011:031002.03.2011
Red Hat Enterprise Linux 5firefoxFixedRHSA-2011:031002.03.2011
Red Hat Enterprise Linux 5xulrunnerFixedRHSA-2011:031002.03.2011
Red Hat Enterprise Linux 6firefoxFixedRHSA-2011:031002.03.2011
Red Hat Enterprise Linux 6xulrunnerFixedRHSA-2011:031002.03.2011
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2011:031102.03.2011

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=675094javascript: URLs in chrome documents (MFSA 2011-08)

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.

nvd
около 15 лет назад

The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.

debian
около 15 лет назад

The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFrag ...

github
около 3 лет назад

The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.

oracle-oval
больше 14 лет назад

ELSA-2011-0311: thunderbird security update (CRITICAL)

6.8 Medium

CVSS2