Arbitrary code execution from Firefox sidebar panel II
Bug #16232 reported by
Tres Seaver
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
firefox (Ubuntu) |
Fix Released
|
Critical
|
Thom May |
Bug Description
Sites can use the _search target to open links in the Firefox sidebar. Two
missing security checks allow malicious scripts to first open a privileged page
(such as about:config) and then inject script using a javascript: url. This
could be used to install malicious code or steal data without user interaction.
Fixed in: Firefox 1.0.3 / Mozilla Suite 1.7.7
Workaround: Disable Javascript
References:
- https:/
http://
To post a comment you must log in.
This vulnerability is fixed in Ubuntu's Firefox 1.0.2-0ubuntu5.1 changelogs. ubuntu. com/changelogs/ pool/main/ m/mozilla- firefox/ mozilla- firefox_ 1.0.2-0ubuntu5. 1/changelog
http://
Closing as Fixed.