[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cross-Site Scripting vulnerability in Mozilla Firefox, Opera and other browsers
I want to warn you about Cross-Site Scripting vulnerability in Mozilla
Firefox, Opera and other browsers. It allows to bypass protection from
Recently, 04.08.2010, I wrote about vulnerability in Mozilla and Mozilla
Firefox at my site. I made full disclosure because Mozilla completely
ignored similar vulnerability, which I informed them in August 2009, like
all other vulnerabilities in Firefox which I wrote in 2009 in my article
Cross-Site Scripting attacks via redirectors
(http://websecurity.com.ua/3386/). After that release I made additional
checks of this vulnerability in different browsers and found that Opera
10.53 is vulnerable (to new and old holes), at that version Opera 9.52 was
not vulnerable. It looks like Opera ignored my article Cross-Site Scripting
attacks via redirectors and those two vulnerabilities (two attack vectors
via redirectors), which I told them about in 2009, and added two new attack
vectors via redirectors.
Earlier I already wrote about Cross-Site Scripting vulnerability in Mozilla,
Firefox and other browsers (http://websecurity.com.ua/3373/) (CVE-2009-3014)
via redirectors with answer "302 Object moved". As I recently checked,
besides earlier mentioned vulnerable browsers also the next browsers are
vulnerable: Firefox 3.0.19, Firefox 3.5.11, Firefox 3.6.8, Firefox 4.0b2 and
Opera 10.53 (at that version Opera 9.52 isn't vulnerable). Recently I
informed Mozilla and Opera about these issues in their browsers.
In Firefox at the sites, which use answer "302 Found" in redirectors, at
browser will show "Found" page, where there is this code in the link “here”.
At click on which the code will execute. I.e. it is Strictly social XSS, and
also this is one more example of Local XSS
With request to script at web site:
Which returns in answer the Location header:
HTTP/1.x 302 Found
The browser will show “Found” page. At click on the link “here” the code
will execute in context of this site.
JS-code, if redirector outputs in Location header the chars ";" and "," in
plain (not in URL encoding) form.
Also in all versions of Mozilla and Mozilla Firefox it's possible to use
another variant of Strictly social XSS - with using of -moz-binding (for
Firefox < 3.0 or for Firefox => 3.0 with xml-file on the same site) or with
using of onMouseOver:
At moving of the cursor on the link “here” the code will execute in context
of this site.
And if to use my MouseOverJacking technique
(http://websecurity.com.ua/3814/), then it's possible to automate this
attack in all versions of Mozilla and Mozilla Firefox (especially when using
of -moz-binding isn't possible):
This attack is possible only if redirector (with "302 Found" or "302 Object
moved" answer) outputs double quote in Location header in plain (not in URL
Vulnerable are Mozilla 1.7.x and previous versions.
Vulnerable are Mozilla Firefox 3.0.19, Firefox 3.5.11, Firefox 3.6.8,
Firefox 4.0b2 and previous versions.
Vulnerable are Opera 10.53 and potentially all 10.x versions (at that
version Opera 9.52 isn't vulnerable).
As in case of XSS via redirectors with answer "302 Object moved", to this
vulnerability also must be vulnerable the next browsers: SeaMonkey 1.1.17,
Firefox 3.7 a1 pre, Orca Browser 1.2 build 5 and Maxthon 3 Alpha (184.108.40.206)
I mentioned about this vulnerability at my site
Best wishes & regards,
Administrator of Websecurity web site