Overview
Mozilla-based web browsers including Firefox contain a vulnerability that may allow an attacker to execute code, or conduct cross-site scripting attacks.
Description
The jar: protocol is designed to extract content from ZIP compressed files. Mozilla-based browsers include support for jar: URIs that are of the form jar:[url]![/path/to/file.ext]. The compressed file does not need to have a .zip extension. From the GNUCITIZEN blog: |
Impact
This vulnerability may allow an attacker to execute cross-site scripting attacks on sites that allow users to upload pictures, archives, or other files. |
Solution
This vulnerability is addressed in Mozilla Firefox 2.0.0.10: From MFSA 2007-37: |
Workarounds for network administrators and users
Workarounds for website administrators
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues
- http://www.mozilla.org/security/announce/2007/mfsa2007-37.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=369814
- http://www.gnucitizen.org/blog/severe-xss-in-google-and-others-due-to-the-jar-protocol-issues
- https://bugzilla.mozilla.org/show_bug.cgi?id=403331
- http://noscript.net/getit#devel
- http://www.mozilla.org/projects/security/components/same-origin.html
Acknowledgements
This vulnerability was disclosed by PDP on the GNUCITIZEN website.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2007-5947 |
Severity Metric: | 29.53 |
Date Public: | 2007-11-07 |
Date First Published: | 2007-11-08 |
Date Last Updated: | 2008-11-20 16:16 UTC |
Document Revision: | 36 |