Lucene search

K
certCERTVU:143297
HistoryJun 08, 2007 - 12:00 a.m.

Mozilla Firefox allows cross-domain iframe access via JavaScript

2007-06-0800:00:00
www.kb.cert.org
429

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.933 High

EPSS

Percentile

99.0%

Overview

Mozilla Firefox allows cross-domain access to an iframe. This vulnerability could allow an attacker to interact with a web site in a different domain. The attacker could read content and cookies, capture keystrokes, and modify content.

Description

An iframe is an HTML element which allows an HTML document to be embedded inside a master HTML document.

The Mozilla same origin policy states:
_The same origin policy prevents document or script loaded from one origin from getting or setting properties of a document from a different origin. The policy dates from Netscape Navigator 2.0.

Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages._
Firefox does not properly enforce the same origin policy to web pages that use iframes.

From Mozilla Bugzilla Bug ID 382686:

_The problem you fixed there is that document.write() could be used to overwrite frames that originate from Internet-based SRC= pointing to non-same-domain site. This is fixed and throws a security exception.

Unfortunately, the check implemented means that about:blank frames can be overwritten freely; and unfortunately, all frames, even with Internet SRC= specified, will be vulnerable to a race condition while the document loads._
Note that some websites that allow users to supply content may allow iframes to be included.


Impact

An attacker may be able to obtain sensitive data from a user, modify the appearance of a webpage or track keystrokes. Depending on the nature of the web site the user was visiting, this data may include passwords, credit card numbers, and any arbitrary information provided by the user.


Solution

Mozilla has addressed this issue with Firefox 2.0.0.5. Please see Mozilla Foundation Security Advisory 2007-20 for details.


Workarounds for users

* Disable JavaScript (see [Securing Your Web Browser](<http://www.us-cert.gov/reading_room/securing_browser/>)).
* Use the [NoScript](<https://addons.mozilla.org/en-US/firefox/addon/722>) Firefox Add-on to whitelist what sites can run JavaScript.
* Type in URLs directly in the web browser's address bar, or use bookmarks to navigate to websites.
* See the [Cross-Site Scripting Vulnerabilities](<http://www.cert.org/archive/pdf/cross_site_scripting.pdf>) document for general information.

Workarounds for administrators

* Do not allow user submitted content to include JavaScript.
* Do not allow users to submit content to a shared resource that includes iframes. A shared resource may include the comments section of a blog or a web forum.
* Monitor the content submitted by third parties for malicious JavaScript or iframes.  

Vendor Information

143297

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: July 18, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Mozilla Foundation Security Advisory 2007-20 for further details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23143297 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Michal Zalewski on the Full-Disclosure mailing list.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-3089
Severity Metric: 8.51 Date Public:

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.933 High

EPSS

Percentile

99.0%