Overview
A vulnerability affecting Mozilla web browsers may allow violation of cross-domain scripting policies and possibly execute code originating from a remote source.
Description
Mozilla web browsers allow the dragging of links and objects from one window to another. Should the object copied be javascript, then it may execute in the context of a script originating from a local source rather than a remote location. According to Mozilla's bug report: "The user could be convinced to drag obscurred links in the context of a game or even a fake scrollbar. If the user could be convinced to drag two links in sequence into a separate window (not frame) the attacker would be able to run arbitrary programs." |
Impact
This vulnerability could be used to exploit cross-domain scripting policies and possibly execute code originating from a remote source. |
Solution
This vulnerability is resolved in Firefox Preview Release, Mozilla 1.7.3, and Thunderbird 0.8. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Jesse Ruderman for reporting this vulnerability.
This document was written by Jason A Rafail.
Other Information
CVE IDs: | None |
Severity Metric: | 25.31 |
Date Public: | 2004-09-14 |
Date First Published: | 2004-09-17 |
Date Last Updated: | 2004-09-17 18:10 UTC |
Document Revision: | 10 |