Firefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly implement certain security checks for script injection, which allows remote attackers to execute script via "Wrapped" javascript: URLs, as demonstrated using (1) a javascript: URL in a view-source: URL, (2) a javascript: URL in a jar: URL, or (3) "a nested variant."
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10351 | signature vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100015 | signature vdb entry |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2005-435.html | vendor advisory |
http://www.securityfocus.com/bid/13641 | vdb entry |
http://www.securityfocus.com/bid/15495 | vdb entry |
http://securitytracker.com/id?1013963 | vdb entry |
http://www.mozilla.org/security/announce/mfsa2005-43.html | patch |
http://securitytracker.com/id?1013962 | vdb entry |
http://www.vupen.com/english/advisories/2005/0530 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2005-434.html | vendor advisory |