Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:21303
HistoryFeb 05, 2009 - 12:00 a.m.

Mozilla Foundation Security Advisory 2009-05

2009-02-0500:00:00
vulners.com
34

Mozilla Foundation Security Advisory 2009-05

Title: XMLHttpRequest allows reading HTTPOnly cookies
Impact: Low
Announced: February 3, 2009
Reporter: Wladimir Palant
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.0.6
SeaMonkey 1.1.15
Description

Developer and Mozilla community member Wladimir Palant reported that cookies marked HTTPOnly were readable by JavaScript via the XMLHttpRequest.getResponseHeader and XMLHttpRequest.getAllResponseHeaders APIs. This vulnerability bypasses the security mechanism provided by the HTTPOnly flag which intends to restrict JavaScript access to document.cookie.

The fix prevents the XMLHttpRequest feature from accessing the Set-Cookie and Set-Cookie2 headers of any response whether or not the HTTPOnly flag was set for those cookies.
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=380418
* CVE-2009-0357