Overview
A vulnerability in Mozilla Firefox may allow a remote attacker to install malicious code on or read protected information from a vulnerable system.
Description
The Firefox web browser features the ability to open a hyperlink in the "search" web panel. Firefox fails to perform adequate security checks on links opened in the web panel. According to the Mozilla advisory on this issue: Sites can use the _search target to open links in the Firefox sidebar. Two missing security checks allow malicious scripts to first open a privileged page (such as about:config) and then inject script using a javascript: url. This could be used to install malicious code or steal data without user interaction. |
Impact
A remote attacker may be able to install malicious code on or read protected information from a vulnerable system. |
Solution
Upgrade |
Workarounds
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to the Mozilla Foundation for reporting this vulnerability. The Mozilla Foundation, in turn, credits Kohei Yoshino with reporting this issue to them.
This document was written by Chad Dougherty and Will Dormann based on information provided by the Mozilla Foundation.
Other Information
CVE IDs: | CVE-2005-1158 |
Severity Metric: | 18.90 |
Date Public: | 2005-04-15 |
Date First Published: | 2005-04-20 |
Date Last Updated: | 2005-12-22 19:47 UTC |
Document Revision: | 14 |