Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-6589

Опубликовано: 28 дек. 2007
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

РелизСтатусПримечание
dapper

not-affected

1.5.dfsg+1.5.0.14~prepatch071125a-0ubuntu1
devel

DNE

edgy

not-affected

2.0.0.11+0nobinonly-0ubuntu0.6.10
feisty

not-affected

2.0.0.11+1nobinonly-0ubuntu0.7.4
gutsy

not-affected

2.0.0.11+2nobinonly-0ubuntu0.7.10
hardy

not-affected

2.0.0.10+2nobinonly-0ubuntu2
intrepid

DNE

upstream

released

2.0.0.10

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

DNE

feisty

DNE

gutsy

ignored

end of life, was needed
hardy

DNE

intrepid

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.1.9+nobinonly-0ubuntu1
edgy

DNE

feisty

DNE

gutsy

DNE

hardy

released

1.1.9+nobinonly-0ubuntu1
intrepid

released

1.1.9+nobinonly-0ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

released

1.8.1.13+nobinonly-0ubuntu1
edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

released

1.8.1.18+nobinonly.b308.cvs20090331t155113-0ubuntu0.7.10.1
hardy

released

1.8.1.13+nobinonly-0ubuntu1
intrepid

released

1.8.1.13+nobinonly-0ubuntu1
upstream

released

1.8.1.13

Показывать по

Ссылки на источники

EPSS

Процентиль: 67%
0.00546
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

debian
больше 17 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMon ...

github
больше 3 лет назад

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

EPSS

Процентиль: 67%
0.00546
Низкий

4.3 Medium

CVSS2