TITLE:
Firefox Property Manipulation Cross-Site Scripting 
Vulnerability

SECUNIA ADVISORY ID:
SA15549

VERIFY ADVISORY:
http://secunia.com/advisories/15549/

CRITICAL:
Moderately critical

IMPACT:
Cross Site Scripting

WHERE:
>From remote

SOFTWARE:
Mozilla Firefox 1.x
http://secunia.com/product/4227/

DESCRIPTION:
Secunia Research has discovered a vulnerability in Firefox, 
which can
be exploited by malicious people to conduct cross-site 
scripting
attacks.

The problem is that the "frames", "parent", "self", and "top" 
DHTML
properties are not properly protected from being modified by 
another
site via JavaScript. This can be exploited to execute arbitrary 
HTML
and script code in a user's browser session in context of an
arbitrary site, which calls a method in one of the modified
properties.

The vulnerability has been confirmed in version 1.0.4. Prior 
versions
may also be affected.

SOLUTION:
Update to version 1.0.5.
http://www.mozilla.org/products/firefox/

ORIGINAL ADVISORY:
Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-52.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to