Описание
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.5.dfsg+1.5.0.14~prepatch071125a-0ubuntu1 |
devel | not-affected | 2.0.0.10+2nobinonly-0ubuntu2 |
edgy | released | 2.0.0.10+0nobinonly-0ubuntu0.6.10 |
feisty | released | 2.0.0.10+1nobinonly-0ubuntu1 |
gutsy | released | 2.0.0.10+2nobinonly-0ubuntu1.7.10.1 |
upstream | released | 2.0.0.10 |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMon ...
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
ELSA-2007-1082: Critical: firefox security update (CRITICAL)
4.3 Medium
CVSS2