Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:20584
HistorySep 29, 2008 - 12:00 a.m.

Mozilla Foundation Security Advisory 2008-38

2008-09-2900:00:00
vulners.com
20

Mozilla Foundation Security Advisory 2008-38

Title: nsXMLDocument::OnChannelRedirect() same-origin violation
Impact: High
Announced: September 23, 2008
Reporter: moz_bug_r_a4
Products: Firefox, Thunderbird, SeaMonkey

Fixed in: Firefox 2.0.0.17
Thunderbird 2.0.0.17
SeaMonkey 1.1.12
Description

Mozilla security researcher moz_bug_r_a4 reported that the same-origin check in nsXMLDocument::OnChannelRedirect() could be bypassed. This vulnerability could be used to execute JavaScript in the context of a different website.

Firefox 3 is not affected by this issue

Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.
Workaround

Disable JavaScript until a version containing these fixes can be installed.
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=439034
* CVE-2008-3835