Overview
Mozilla-based browsers contain a cross-domain vulnerability, which may allow an attacker to access data in other sites.
Description
Mozilla uses a same origin security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. From the same origin policy: Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages. |
Impact
By convincing a victim to view an HTML document (web page), an attacker could modify data in another domain. For example, web page script in one domain could set a cookie for a web page in another domain. |
Solution
Apply an update |
Disable the ability to set location.hostname
Disable JavaScript in your browser's preferences. Instructions for disabling JavaScript can be found in the Securing Your Web Browser document and the Malicious Web Scripts FAQ. Some Mozilla add-ons can simplify the ability to enable or disable JavaScript, or set up site-specific rules for doing so. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=370445
- http://www.mozilla.org/projects/security/components/same-origin.html
- http://msdn.microsoft.com/workshop/author/dhtml/reference/properties/domain.asp
- https://addons.mozilla.org/
- http://secunia.com/advisories/24175/
- http://securitytracker.com/alerts/2007/Feb/1017654.html
- http://www.securityfocus.com/bid/22566
- http://www.mozilla.org/security/announce/2007/mfsa2007-07.html
- http://secunia.com/advisories/24238/
- http://secunia.com/advisories/24287/
- http://secunia.com/advisories/24205/
- http://secunia.com/advisories/24290/
- http://secunia.com/advisories/24320/
- http://secunia.com/advisories/24328/
- http://secunia.com/advisories/24293/
- http://secunia.com/advisories/24327/
- http://secunia.com/advisories/24289/
- http://secunia.com/advisories/24343/
- http://secunia.com/advisories/24333/
- http://secunia.com/advisories/24393/
- http://secunia.com/advisories/24352/
- http://www.ciac.org/ciac/bulletins/r-164.shtml
- http://secunia.com/advisories/24384/
- http://secunia.com/advisories/24455/
- http://secunia.com/advisories/24457/
- http://www.securityfocus.com/bid/22566
Acknowledgements
This vulnerability was publicly disclosed by Michal Zalewski.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2007-0981 |
Severity Metric: | 6.76 |
Date Public: | 2007-02-14 |
Date First Published: | 2007-02-15 |
Date Last Updated: | 2007-03-09 15:41 UTC |
Document Revision: | 54 |